OneTrust LLC

United States of America

Back to Profile

1-100 of 501 for OneTrust LLC Sort by
Query
Aggregations
IP Type
        Patent 422
        Trademark 79
Jurisdiction
        United States 396
        World 64
        Europe 29
        Canada 12
Date
New (last 4 weeks) 5
2024 April (MTD) 4
2024 March 1
2024 January 2
2023 December 1
See more
IPC Class
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules 261
G06Q 10/06 - Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling 117
G06F 21/55 - Detecting local intrusion or implementing counter-measures 114
H04L 29/06 - Communication control; Communication processing characterised by a protocol 114
G06F 15/76 - Architectures of general purpose stored program computers 107
See more
NICE Class
41 - Education, entertainment, sporting and cultural services 46
42 - Scientific, technological and industrial services, research and design 35
09 - Scientific and electric apparatus and instruments 29
45 - Legal and security services; personal services for individuals. 19
35 - Advertising and business services 13
See more
Status
Pending 73
Registered / In Force 428
  1     2     3     ...     6        Next Page

1.

DATA PROCESSING CONSENT CAPTURE SYSTEMS AND RELATED METHODS

      
Application Number 18542234
Status Pending
Filing Date 2023-12-15
First Publication Date 2024-04-11
Owner OneTrust, LLC (USA)
Inventor
  • Brannon, Jonathan Blake
  • Whitney, Patrick

Abstract

In various embodiments, a data processing consent capture system may be configured to prompt the data subject to consent to one or more types of data processing (e.g., to provide a desired consent) in response to identifying particular cookies (e.g., or types of data processing) that a data subject has not consented to. The system may, for example, substantially automatically prompt the data subject to consent for one or more particular types of data processing in response to determining that the user (e.g., data subject) has requested that a website or other system perform one or more functions that are not possible without a particular type of consent from the data subject. The system may, for example, prompt the user to consent in time for a certain interaction with the website, application, etc.

IPC Classes  ?

  • G06F 16/958 - Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
  • G06F 16/951 - Indexing; Web crawling techniques
  • G06F 16/957 - Browsing optimisation, e.g. caching or content distillation
  • G06F 40/174 - Form filling; Merging

2.

DATA PROCESSING SYSTEMS AND METHODS FOR ANONYMIZING DATA SAMPLES IN CLASSIFICATION ANALYSIS

      
Application Number 18264019
Status Pending
Filing Date 2022-02-08
First Publication Date 2024-04-04
Owner OneTrust, LLC (USA)
Inventor
  • Jones, Kevin
  • Pitchaimani, Saravanan

Abstract

In general, various aspects of the present invention provide methods, apparatuses, systems, computing devices, computing entities, and/or the like for mapping the existence of target data within computing systems in a manner that does not expose the target data to potential data-related incidents. In accordance with various aspects, a method is provided that comprises: receiving a source dataset that comprises a label assigned to a data element used by a data source in handling target data that identifies a type of target data and data samples gathered for the data element; determining, based on the label, that the data samples are to be anonymized; generating supplemental anonymizing data samples associated with the label that comprise fictitious occurrences of the type of the target data; generating a review dataset comprising the supplemental anonymizing data samples intermingled with the data samples; and sending the review dataset to a review computing system.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06N 20/20 - Ensemble learning

3.

TRUSTONOMY

      
Application Number 019007779
Status Pending
Filing Date 2024-04-02
Owner OneTrust LLC (USA)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 41 - Education, entertainment, sporting and cultural services

Goods & Services

Digital media in the form of downloadable webcasts, podcasts, audio and video files, for use on mobile devices in the fields of responsible artificial intelligence (AI), AI governance, privacy management, consent management, compliance, ethics, environmental sustainability and responsibility, carbon accounting, reduction and offsetting, environmental, social, and corporate governance (ESG), and ESG program management. Entertainment services, namely, providing podcasts and webcasts in the fields of responsible artificial intelligence (AI), privacy management, consent management, compliance, AI governance, ethics, environmental sustainability and responsibility, carbon accounting, reduction and offsetting, environmental, social, and corporate governance (ESG) and ESG program management.

4.

TRUSTONOMY

      
Application Number 231882800
Status Pending
Filing Date 2024-04-01
Owner OneTrust LLC (USA)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 35 - Advertising and business services
  • 41 - Education, entertainment, sporting and cultural services
  • 42 - Scientific, technological and industrial services, research and design
  • 45 - Legal and security services; personal services for individuals.

Goods & Services

(1) Digital media in the form of downloadable webcasts, podcasts, audio and video files, for use on mobile devices in the fields of responsible artificial intelligence (AI); AI governance; privacy management; consent management; compliance; ethics; environmental sustainability and responsibility, carbon accounting, reduction and offsetting, environmental, social, and corporate governance (ESG), and ESG program management (1) Entertainment services, namely, providing podcasts and webcasts in the fields of responsible artificial intelligence (AI); privacy management; consent management; compliance; AI governance; ethics; environmental sustainability and responsibility, carbon accounting, reduction and offsetting, environmental, social, and corporate governance (ESG) and ESG program management.

5.

SYSTEMS AND METHODS FOR MITIGATING RISKS OF THIRD-PARTY COMPUTING SYSTEM FUNCTIONALITY INTEGRATION INTO A FIRST-PARTY COMPUTING SYSTEM

      
Application Number 18275910
Status Pending
Filing Date 2022-02-10
First Publication Date 2024-03-21
Owner OneTrust, LLC (USA)
Inventor
  • Viswanathan, Subramanian
  • Shah, Milap

Abstract

In general, various aspects of the present invention provide methods, apparatuses, systems, computing devices, computing entities, and/or the like for integrating third party computing system functionality into a first party computing system by providing a risk management and mitigation computing system configured to analyze a risk of integrating the functionality provided by the third party computing system and facilitating implementation of one or more data-related controls that include performing computer-specific operations to mitigate and/or eliminate the identified risks. For example, the risk management and mitigation computing system can access risk data in tenant computing systems to determine a risk score related to the integration of the third party computing system functionality based on risks determined during prior integrations of the third party computing system functionality by other tenant computing systems. The risk management and mitigation computing system can generate a recommended control when integrating the third party computing system functionality.

IPC Classes  ?

6.

DYNAMICALLY UPDATING CLASSIFIER PRIORITY OF A CLASSIFIER MODEL IN DIGITAL DATA DISCOVERY

      
Application Number 18453650
Status Pending
Filing Date 2023-08-22
First Publication Date 2024-02-29
Owner OneTrust LLC (USA)
Inventor
  • Cai, Tianchen
  • Viswanathan, Subramanian

Abstract

Methods, systems, and non-transitory computer readable storage media are disclosed for updating the priority of classifiers in a classifier model. Specifically, the disclosed systems execute operations to extract data elements from a digital dataset. The disclosed system generates first classifier labels for a first subset of data elements (e.g., a test dataset) by utilizing a classification model to apply a predetermined order of classifiers to the first subset of data elements. The disclosed systems utilize the first classifier labels to determine a priority order for the classifiers for applying to a second subset of data elements the digital dataset. Using the determined priority order of the classifiers, the disclosed systems can generate second classifier labels for a second subset of data elements by utilizing the classifier model to apply the classifiers according to the priority order.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 9/48 - Program initiating; Program switching, e.g. by interrupt
  • G06F 16/28 - Databases characterised by their database models, e.g. relational or object models

7.

DYNAMICALLY UPDATING CLASSIFIER PRIORITY OF A CLASSIFIER MODEL IN DIGITAL DATA DISCOVERY

      
Application Number US2023072695
Publication Number 2024/044612
Status In Force
Filing Date 2023-08-23
Publication Date 2024-02-29
Owner ONETRUST LLC (USA)
Inventor
  • Cai, Tianchen
  • Viswanathan, Subramanian

Abstract

Methods, systems, and non-transitory computer readable storage media are disclosed for updating the priority of classifiers in a classifier model. Specifically, the disclosed systems execute operations to extract data elements from a digital dataset. The disclosed system generates first classifier labels for a first subset of data elements (e.g., a test dataset) by utilizing a classification model to apply a predetermined order of classifiers to the first subset of data elements. The disclosed systems utilize the first classifier labels to determine a priority order for the classifiers for applying to a second subset of data elements the digital dataset. Using the determined priority order of the classifiers, the disclosed systems can generate second classifier labels for a second subset of data elements by utilizing the classifier model to apply the classifiers according to the priority order.

IPC Classes  ?

  • G06F 16/25 - Integrating or interfacing systems involving database management systems
  • G06F 16/28 - Databases characterised by their database models, e.g. relational or object models
  • G06F 16/35 - Clustering; Classification

8.

SYSTEMS AND METHODS FOR TARGETED DATA DISCOVERY

      
Application Number 18469428
Status Pending
Filing Date 2023-09-18
First Publication Date 2024-01-04
Owner OneTrust, LLC (USA)
Inventor
  • Jones, Kevin
  • Pitchaimani, Saravanan
  • Viswanathan, Subramanian
  • Shah, Milap
  • Malladi, Ramana
  • Allidina, Aadil
  • Hennig, Matthew
  • Patton-Kuhl, Dylan D.
  • Brannon, Jonathan Blake

Abstract

Various embodiments provide methods, apparatus, systems, computing devices, computing entities, and/or the like for identifying targeted data for a data subject across a plurality of data objects in a data source. In accordance with one embodiment, a method is provided comprising: receiving a request to identify targeted data for a data subject; identifying a first data object using metadata for a data source that identifies the first data object as associated with a first targeted data type for a data portion from the request; identifying a first data field from a graph data structure of the first data object that identifies the first data field as used for storing data having the first targeted data type; and querying the first data object based on the first data field and the data for the first targeted data type to identify a first targeted data portion for the data subject.

IPC Classes  ?

  • G06F 16/242 - Query formulation
  • G06N 20/00 - Machine learning
  • G06F 16/25 - Integrating or interfacing systems involving database management systems
  • G06F 16/23 - Updating
  • G06F 16/2457 - Query processing with adaptation to user needs
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation

9.

Automated Risk Assessment Module with Real-Time Compliance Monitoring

      
Application Number 18469893
Status Pending
Filing Date 2023-09-19
First Publication Date 2024-01-04
Owner OneTrust LLC (USA)
Inventor
  • Murray, Patrick Glenn
  • Kwong, Carman
  • Cross, Christopher
  • Costa Moreno, Jose
  • Shergill, Harpreet
  • Callin, Keegan

Abstract

Techniques are disclosed for usage-tracking of various information security (InfoSec) entities for tenants/organization onboarded on an instant multi-tenant security assurance platform. The InfoSec entities include policies, procedures, controls and evidence tasks. A policy or procedure is enforced by implementing one or more controls, and the collection of one or more evidence tasks proves/verifies the implementation of a control. The InfoSec entities are linked to each other across the platform and accrue a number of benefits for the tenants. These include generating a security questionnaire response (SQR), defining a readiness project and an audit project, sharing InfoSec entities encompassing the various products of a tenant, automating risk assessment, automatic collection of evidence tasks for verifying the implementation and/or operational state/status of various mitigating controls, etc.

IPC Classes  ?

10.

DYNAMIC GENERATION OF GRAPHICAL USER INTERFACES FOR RETRIEVING DATA FROM MULTIPLE COMPUTING SYSTEMS

      
Application Number 18336525
Status Pending
Filing Date 2023-06-16
First Publication Date 2023-12-21
Owner OneTrust, LLC (USA)
Inventor
  • Quintas, Dan
  • Jooma, Sohail
  • Gururaj, Raghavendra
  • Bhattiprolu, Ravi
  • Curtis, Brett A.
  • Heavner, Alexander
  • Beita, Jose Daniel

Abstract

Aspects of the present invention provide methods, systems, and/or the like for (1) receiving a set of delegates; (2) generating a corresponding GUI for each delegate in the set of delegates, wherein the corresponding GUI is configured with a respective display element that provides a request for the corresponding data unit and an input element for receiving the corresponding data unit; (3) generating at least one corresponding delegate record for each delegate of the set of delegates, wherein the at least one corresponding delegate record identifies the corresponding data unit and the corresponding graphical user interface and is stored in a centralized repository; (4) generating a corresponding electronic communication for each delegate of the set of delegates, wherein the corresponding electronic communication comprises a link to access the corresponding GUI; and (5) sending the corresponding electronic communication for each delegate of the set of delegates to the corresponding assignee.

IPC Classes  ?

  • G06F 9/451 - Execution arrangements for user interfaces
  • G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
  • G06F 3/0481 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation

11.

IDENTIFYING SIMILAR DOCUMENTS IN A FILE REPOSITORY USING UNIQUE DOCUMENT SIGNATURES

      
Application Number 18165489
Status Pending
Filing Date 2023-02-07
First Publication Date 2023-11-23
Owner OneTrust LLC (USA)
Inventor
  • Avadhani, Madan
  • Sharma, Swapnil

Abstract

Methods, systems, and non-transitory computer readable storage media are disclosed for determining clusters of similar digital documents using unique document signatures. Specifically, the disclosed system processes digital text in a digital document to tokenize character strings (e.g., words) in the digital document by combining a subset of character values and string lengths in the character strings. Additionally, the disclosed system generates a document signature for the digital document by combining subsets of tokens generated for the digital document into a token sequence indicative of the digital text in the digital document. The disclosed system determines a cluster of similar digital documents including the digital document by comparing the document signature of the digital document to document signatures corresponding to a plurality of digital documents.

IPC Classes  ?

  • G06F 16/93 - Document management systems
  • G06F 40/284 - Lexical analysis, e.g. tokenisation or collocates
  • G06F 16/35 - Clustering; Classification
  • G06F 16/31 - Indexing; Data structures therefor; Storage structures

12.

MANAGING THE DEVELOPMENT AND USAGE OF MACHINE-LEARNING MODELS AND DATASETS VIA COMMON DATA OBJECTS

      
Application Number 18319301
Status Pending
Filing Date 2023-05-17
First Publication Date 2023-11-23
Owner OneTrust LLC (USA)
Inventor
  • Wiggins, Shane
  • Jones, Kevin

Abstract

Methods, systems, and non-transitory computer readable storage media are disclosed for managing implementation of machine-learning models within computing environments according to system requirements frameworks via common data objects. The disclosed system generates a common data object to represent an implementation of a machine-learning model with a data process. For example, the disclosed system determines attribute values of the common data object according to data objects representing the machine-learning model and related datasets. Furthermore, the disclosed system utilizes the common data object to validate the machine-learning model according to a digital representation of a system requirements framework that includes usage requirements for machine-learning models to store, process, transmit, or otherwise handle specific data types in specific ways for the one or more data processes within a computing environment. The disclosed systems also perform operations to implement, suspend, or otherwise modify the machine-learning model or datasets based on the validation.

IPC Classes  ?

13.

ROUTING DIGITAL CONTENT ITEMS TO PRIORITY-BASED PROCESSING QUEUES ACCORDING TO PRIORITY CLASSIFICATIONS OF THE DIGITAL CONTENT ITEMS

      
Application Number US2023067138
Publication Number 2023/225570
Status In Force
Filing Date 2023-05-17
Publication Date 2023-11-23
Owner ONETRUST LLC (USA)
Inventor
  • Wiggins, Shane
  • Jones, Kevin

Abstract

Methods, systems, and non-transitory computer readable storage media are disclosed for routing digital content items to priority-based processing queues based on classifications of the digital content items according to one or more system requirements frameworks. Specifically, the disclosed system scans and classifies digital content items at a digital data repository based on data types included in the digital content items. The disclosed system utilizes a classification model with a classification profile to classify the digital content items according to one or more system requirements frameworks and routes the digital content items to priority-based processing queues according to priority levels indicated by the classifications. Furthermore, the disclosed system provides indications of classifications of the portions of the digital content items (e.g., to indicate high priority data). The disclosed system can also perform additional computing operations on the digital content items according to the routing via the priority-based processing queues.

IPC Classes  ?

14.

MANAGING THE DEVELOPMENT AND USAGE OF MACHINE-LEARNING MODELS AND DATASETS VIA COMMON DATA OBJECTS

      
Application Number US2023067132
Publication Number 2023/225566
Status In Force
Filing Date 2023-05-17
Publication Date 2023-11-23
Owner ONETRUST LLC (USA)
Inventor
  • Wiggins, Shane
  • Jones, Kevin

Abstract

Methods, systems, and non-transitory computer readable storage media are disclosed for managing implementation of machine-learning models within computing environments according to system requirements frameworks via common data objects. The disclosed system generates a common data object to represent an implementation of a machine-learning model with a data process. For example, the disclosed system determines attribute values of the common data object according to data objects representing the machine-learning model and related datasets. Furthermore, the disclosed system utilizes the common data object to validate the machine-learning model according to a digital representation of a system requirements framework that includes usage requirements for machine-learning models to store, process, transmit, or otherwise handle specific data types in specific ways for the one or more data processes within a computing environment. The disclosed systems also perform operations to implement, suspend, or otherwise modify the machine-learning model or datasets based on the validation.

IPC Classes  ?

  • G06N 3/10 - Interfaces, programming languages or software development kits, e.g. for simulating neural networks
  • G06F 3/0482 - Interaction with lists of selectable items, e.g. menus
  • G06F 3/04847 - Interaction techniques to control parameter settings, e.g. interaction with sliders or dials
  • G06N 3/0442 - Recurrent networks, e.g. Hopfield networks characterised by memory or gating, e.g. long short-term memory [LSTM] or gated recurrent units [GRU]
  • G06N 3/045 - Combinations of networks
  • G06N 3/0464 - Convolutional networks [CNN, ConvNet]

15.

Dynamically generating and managing request queues for processing electronic requests via a shared processing infrastructure

      
Application Number 17662709
Grant Number 11805067
Status In Force
Filing Date 2022-05-10
First Publication Date 2023-10-31
Grant Date 2023-10-31
Owner OneTrust LLC (USA)
Inventor
  • Balasubramanian, Anand
  • Sayyed, Shamshuddin
  • Tiwari, Rajeev
  • Tayi, Sunil
  • Hennig, Matthew

Abstract

Methods, systems, and non-transitory computer readable storage media are disclosed for utilizing dynamic request queues to process electronic requests in a shared infrastructure environment. The disclosed system dynamically generates a plurality of separate request queues for tenant computing systems that utilize a shared processing infrastructure to issue electronic requests for processing by various recipient processors (e.g., one or more processing threads) by separating a primary request queue into the separate requests queues based on the tenant computing systems. The disclosed system also generates a plurality of queue order scores for the request queues based in part on a processing recency of each of the request queues and whether the request queues have pending electronic requests. The disclosed system processes electronic requests in the request queues by selecting a request queue based on the queue order scores and processing a batch of electronic requests utilizing a recipient processor.

IPC Classes  ?

  • H04L 47/62 - Queue scheduling characterised by scheduling criteria
  • H04L 67/1031 - Controlling of the operation of servers by a load balancer, e.g. adding or removing servers that serve requests
  • H04L 47/52 - Queue scheduling by attributing bandwidth to queues
  • H04L 47/60 - Queue scheduling implementing hierarchical scheduling

16.

DATA PROCESSING SYSTEMS AND METHODS FOR AUTOMATICALLY DETECTING TARGET DATA TRANSFERS AND TARGET DATA PROCESSING

      
Application Number 18027217
Status Pending
Filing Date 2021-09-21
First Publication Date 2023-10-19
Owner OneTrust, LLC (USA)
Inventor
  • Brannon, Jonathan Blake
  • Whitney, Patrick

Abstract

Aspects of the present disclosure provide methods, apparatuses, systems, computing devices, computing entities, and/or the like for protection of system software, or data from destruction, unauthorized modification, and/or unauthorized disclosure securing by, for example, detecting the transfer and/or processing of target data. Accordingly, a method is provided that involves: scanning a software application to identify functionality configured for processing target data; identifying fields associated with the functionality; identifying metadata associated with a field; generating, from the metadata, an identification of a type of data associated with the field; determining a location based on the processing of the target data by the functionality; determining a risk associated with the functionality processing the target data based on the location and the type of data; determining that the risk satisfies a threshold level of risk; and in response, causing an action to be performed to mitigate the risk.

IPC Classes  ?

  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

17.

TRUSTONOMY

      
Serial Number 98210717
Status Pending
Filing Date 2023-10-05
Owner ONETRUST LLC ()
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 41 - Education, entertainment, sporting and cultural services

Goods & Services

Digital media in the form of downloadable webcasts, podcasts, audio and video files, for use on mobile devices in the fields of responsible artificial intelligence (AI); AI governance; privacy management; consent management; compliance; ethics; environmental sustainability and responsibility, carbon accounting, reduction and offsetting, environmental, social, and corporate governance (ESG), and ESG program management Entertainment services, namely, providing podcasts and webcasts in the fields of responsible artificial intelligence (AI); privacy management; consent management; compliance; AI governance; ethics; environmental sustainability and responsibility, carbon accounting, reduction and offsetting, environmental, social, and corporate governance (ESG) and ESG program management

18.

MANAGING IMPLEMENTATION OF DATA CONTROLS FOR COMPUTING SYSTEMS

      
Application Number 18189767
Status Pending
Filing Date 2023-03-24
First Publication Date 2023-09-28
Owner OneTrust, LLC (USA)
Inventor
  • Milind, Vinayak S.
  • Gangadharaiah, Bhyruva S.

Abstract

In general, various aspects of the present invention provide methods, apparatuses, systems, computing devices, computing entities, and/or the like for managing implementation of data controls for computing systems. In various aspects, a method is provided that comprises: comparing a first version of a dataset describing a regulatory framework to a second version of the dataset to identify a change to a data control; in response: processing, using a featurization technique, a portion of the dataset to generate a feature representation of the change that comprises feature attributes representing the change; processing, using a first machine-learning model, the feature representation to generate tags representing characteristics of the change; processing, using a second machine-learning model, the tags to generate an applicable domain; identifying, based on the domain, a computing system affected by the change; and in response, coordinating an action to be performed for the computing system to address the change.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 40/40 - Processing or translation of natural language

19.

DATA PROCESSING SYSTEMS AND METHODS FOR SYNCHING PRIVACY-RELATED USER CONSENT ACROSS MULTIPLE COMPUTING DEVICES

      
Application Number 18326558
Status Pending
Filing Date 2023-05-31
First Publication Date 2023-09-28
Owner OneTrust, LLC (USA)
Inventor
  • Brannon, Jonathan Blake
  • Whitney, Patrick
  • Cash, Alex
  • Wyckoff, Spencer
  • Hanson, Stephanie
  • Doshi, Pratik

Abstract

A privacy-related consent extension and data processing system may be configured to automatically extend one or more privacy-related consents for a user of a first computing device to a second computing device. In various embodiments, the system is configured to provide a computer-readable indicium (indicia) on a previously unknown computing device upon initiation of a transaction between a user and an entity collecting and processing privacy data. In response to a user using a known computing device to scan the computer-readable indicium, in various embodiments, the system may provide the ability to share user consent data provided by the first known device to the second unknown device, allowing the user to provide consent without manually re-entering privacy and consent preferences.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 11/30 - Monitoring
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation

20.

GENERATING ACTION RECOMMENDATIONS FOR MODIFYING PHYSICAL EMISSIONS SOURCES UTILIZING A MODIFIED GRADIENT DESCENT MODEL

      
Application Number 18326474
Status Pending
Filing Date 2023-05-31
First Publication Date 2023-09-28
Owner OneTrust LLC (USA)
Inventor
  • Avadhani, Madan
  • Dandamudi, Akhil
  • Jooma, Sohail
  • Redman, Phil
  • Hill, Casey
  • Quintas, Daniel B

Abstract

Methods, systems, and non-transitory computer readable storage media are disclosed for generating action recommendations modifying physical emissions sources of an entity based on past and modeled emissions for the entity. Specifically, the disclosed system monitors emissions produced by an entity by determining a number of emissions sources corresponding to an entity and a plurality of emissions values for the emissions sources. Additionally, the disclosed system determines a plurality of constraints corresponding to the entity. The disclosed system also determines goals for the entity including target emissions values. The disclosed system utilizes a modified gradient descent model to iteratively adjust emissions values for the physical emissions sources to obtain the target emissions values according to the constraints. The disclosed system generates action recommendations for modifying the physical emissions sources utilizing the modified gradient descent model and provides the action recommendations for display within a graphical user interface.

IPC Classes  ?

  • G05B 23/02 - Electric testing or monitoring
  • G06F 40/40 - Processing or translation of natural language
  • G05B 15/02 - Systems controlled by a computer electric
  • G06F 3/04847 - Interaction techniques to control parameter settings, e.g. interaction with sliders or dials
  • G06N 3/04 - Architecture, e.g. interconnection topology
  • G06Q 50/06 - Electricity, gas or water supply
  • G06N 7/01 - Probabilistic graphical models, e.g. probabilistic networks
  • G06N 3/045 - Combinations of networks
  • G06Q 10/04 - Forecasting or optimisation specially adapted for administrative or management purposes, e.g. linear programming or "cutting stock problem"

21.

GENERATING FORECASTED EMISSIONS VALUE MODIFICATIONS AND MONITORING FOR PHYSICAL EMISSIONS SOURCES UTILIZING MACHINE-LEARNING MODELS

      
Application Number 18326499
Status Pending
Filing Date 2023-05-31
First Publication Date 2023-09-28
Owner OneTrust LLC (USA)
Inventor
  • Avadhani, Madan
  • Dandamudi, Akhil

Abstract

Methods, systems, and non-transitory computer readable storage media are disclosed for generating action recommendations for generating action recommendations for modifying physical emissions sources of an entity based on forecasting and monitoring emissions production for the entity utilizing machine-learning models. Specifically, the disclosed system forecasts emissions produced by an entity by utilizing a plurality of different forecasting machine-learning models corresponding to different physical emissions sources to generate forecasted source attributes. Additionally, the disclosed system combines the forecasted source attributes to generate a plurality of forecasted emissions value modifications for a future time period. The disclosed system generates action recommendations for modifying the physical emissions sources based on the forecasted emissions value modifications. In additional embodiments, the disclosed system tracks emissions of the entity during the future time period and generate additional action recommendations in response to detecting deviations from forecasted emissions production.

IPC Classes  ?

  • G06N 7/01 - Probabilistic graphical models, e.g. probabilistic networks
  • G06N 3/045 - Combinations of networks
  • G05B 15/02 - Systems controlled by a computer electric
  • G05B 23/02 - Electric testing or monitoring
  • G06F 3/04847 - Interaction techniques to control parameter settings, e.g. interaction with sliders or dials
  • G06N 3/04 - Architecture, e.g. interconnection topology
  • G06Q 50/06 - Electricity, gas or water supply
  • G06Q 10/04 - Forecasting or optimisation specially adapted for administrative or management purposes, e.g. linear programming or "cutting stock problem"
  • G06F 40/40 - Processing or translation of natural language

22.

DATA PROCESSING SYSTEMS AND METHODS FOR AUTOMATICALLY REDACTING UNSTRUCTURED DATA FROM A DATA SUBJECT ACCESS REQUEST

      
Application Number 18019952
Status Pending
Filing Date 2021-08-06
First Publication Date 2023-09-14
Owner OneTrust, LLC (USA)
Inventor
  • Brannon, Jonathan Blake
  • Jones, Kevin
  • Pitchaimani, Saravanan
  • Raghupathy, Haribalan
  • Sarangapani, Mahashankar
  • Sivan, Mahesh
  • Malhotra, Priya

Abstract

System and methods are disclosed for redacting analyzing unstructured data in a request for data associated with a data subject to determine whether the unstructured data is relevant to the request. The relevancy of pieces of the unstructured data may be determined by determining a categorization for each such piece of unstructured data and comparing them to known personal data associated with the data subject having the same categorization. Pieces of the unstructured data that do not match known personal data having the same categorization are redacted from the request before the request is processed.

IPC Classes  ?

  • G06F 16/335 - Filtering based on additional data, e.g. user or group profiles
  • G06F 16/35 - Clustering; Classification

23.

SYSTEMS AND METHODS FOR DISCOVERY, CLASSIFICATION, AND INDEXING OF DATA IN A NATIVE COMPUTING SYSTEM

      
Application Number 18312498
Status Pending
Filing Date 2023-05-04
First Publication Date 2023-08-31
Owner OneTrust, LLC (USA)
Inventor
  • Raghupathy, Haribalan
  • Pitchaimani, Saravanan
  • Lynn, Jonathan
  • Shinde, Rahul
  • Jones, Kevin
  • Viswanathan, Subramanian
  • Sivan, Mahesh
  • Dana, Zara
  • Shah, Milap
  • Chandramohan, Sivanandame
  • Upadhyay, Abhishek
  • Balasubramanian, Anand

Abstract

In general, various aspects provide methods, apparatuses, systems, computing devices, computing entities, and/or the like for performing data discovery on a target computing system. In various aspects, a third party computing connects, via a public data network, to an edge node of the target computing system and instructs the target computing system to execute jobs to discover target data stored in data repositories in a private data network in the target computing system. In some aspects, the third party computing system may schedule the jobs on the target computing system based on computing resource availability on the target computing system.

IPC Classes  ?

  • G06F 16/2452 - Query translation
  • G06F 16/22 - Indexing; Data structures therefor; Storage structures
  • G06F 40/284 - Lexical analysis, e.g. tokenisation or collocates
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06Q 10/063 - Operations research, analysis or management
  • G06F 18/21 - Design or setup of recognition systems or techniques; Extraction of features in feature space; Blind source separation

24.

FIRST-PARTY COMPUTING SYSTEM SPECIFIC QUERY RESPONSE GENERATION FOR INTEGRATION OF THIRD-PARTY COMPUTING SYSTEM FUNCTIONALITY

      
Application Number 18314027
Status Pending
Filing Date 2023-05-08
First Publication Date 2023-08-31
Owner OneTrust, LLC (USA)
Inventor
  • Brannon, Jonathan Blake
  • Sabourin, Jason L.
  • Viswanathan, Subaramanian
  • Haridas, Manesh
  • Shah, Milap

Abstract

A method, in various aspects, comprises: (1) receiving a query from a first party computing system related to integrating third party computing functionality into the first party computing system; (2) identifying a set of third party entities that provide the third party computing functionality; (3) accessing integration data; (4) identifying a set of reference entities, the set of reference entities including, for each respective third party entity, a respective reference entity that has previously integrated the third party computing into a respective reference entity computing system associated with the respective reference entity; (5) determining second integration data with respect to the set of reference entities integrating the third party computing functionality; (6) generating, based on the first integration data and the second integration data, data responsive to the query that is specific to the first party computing system; and (7) taking an action with respect to the data.

IPC Classes  ?

  • G06Q 10/0635 - Risk analysis of enterprise or organisation activities
  • G06Q 10/067 - Enterprise or organisation modelling
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 15/76 - Architectures of general purpose stored program computers

25.

MAPPING ENTITIES IN UNSTRUCTURED TEXT DOCUMENTS VIA ENTITY CORRECTION AND ENTITY RESOLUTION

      
Application Number 17813384
Status Pending
Filing Date 2022-07-19
First Publication Date 2023-08-24
Owner OneTrust LLC (USA)
Inventor
  • Avadhani, Madan
  • Kille, Siddhartha

Abstract

Methods, systems, and non-transitory computer readable storage media are disclosed for correcting entity detection errors with entity correction and resolution in optical character recognition for digitization of physical documents. Specifically, the disclosed system utilizes named entity recognition to extract entities from character strings (e.g., words) in a digital text document. The disclosed system also tokenizes the character strings in the digital text document based on attributes of the character strings. Furthermore, the disclosed system compares the extracted entities and tokenized character strings to determine similarity metrics between the extracted entities and tokenized character strings. The disclosed system also compares extracted entities to character strings including special/numerical characters to determine similarity metrics indicating correlation probabilities between entities and character strings. The disclosed systems generate mappings between the tokens and entities based on the similarity metrics to resolve entities to likely corresponding character strings while correcting for errors during entity extraction.

IPC Classes  ?

26.

ACCESS CONTROL OF DATA BASED ON PURPOSE AND/OR CONSENT

      
Application Number US2023011446
Publication Number 2023/146854
Status In Force
Filing Date 2023-01-24
Publication Date 2023-08-03
Owner ONETRUST, LLC (USA)
Inventor
  • Jones, Kevin
  • Raghupathy, Haribalan
  • Hennig, Matthew
  • Brannon, Jonathan Blake

Abstract

Aspects of the present invention provide methods, apparatuses, systems, computing devices, computing entities, and/or the like for implementing and managing access to particular data based on access controls for implementing purpose restrictions and/or consent restrictions. In various aspects, a method is provided that comprises: receiving a request transmitted by an application executing on a client computing system and requesting access to a dataset, wherein each data record of the dataset comprises data elements; identifying, based on the application, a purpose for the application requesting access to the dataset; referencing, based on the purpose, an applicable purpose-based access-control policy to identify an authorization token; and providing the authorization token, wherein the storage computing system provides the client computing system with a view of the dataset based on the token with the view having a data element returning modified data in a manner compliant with the applicable purpose-based access-control policy.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 21/84 - Protecting input, output or interconnection devices output devices, e.g. displays or monitors

27.

RISK MODELING AND VISUALIZATION USING MULTIDIMENSIONAL INTERFACES

      
Application Number US2023061101
Publication Number 2023/147280
Status In Force
Filing Date 2023-01-23
Publication Date 2023-08-03
Owner ONETRUST LLC (USA)
Inventor Merk, Anton

Abstract

The present disclosure relates to systems, methods, and non-transitory computer readable media for generating multidimensional risk visualizations depicting severity and frequency and for predicting risk mitigation strategies. For example, the disclosed systems generate multidimensional risk visualizations that present visual representations of risk severity and risk frequency in multidimensional formats, including many risk dimensions at once. In certain cases, the disclosed systems further utilize a particular machine learning model such as a strategy prediction neural network to generate predicted mitigation strategies based on risk data.

IPC Classes  ?

  • G06Q 10/0635 - Risk analysis of enterprise or organisation activities

28.

DEDUPLICATING ELECTRONIC SURVEY QUESTIONS UTILIZING MACHINE-LEARNING MODEL DOMAIN CLASSIFICATION

      
Application Number US2023061587
Publication Number 2023/147554
Status In Force
Filing Date 2023-01-30
Publication Date 2023-08-03
Owner ONETRUST LLC (USA)
Inventor
  • Brannon, Jonathan Blake
  • Jagarlamudi, Anil C
  • Sabourin, Jason L

Abstract

Methods, systems, and non-transitory computer readable storage media are disclosed for utilizing machine-learning models to deduplicate electronic survey questions of electronic surveys or questionnaires in real-time. Specifically, the disclosed system maps electronic survey questions to specific domain classifications by utilizing a machine-learning model to classify portions of electronic surveys based on context within the portions of the electronic surveys. Additionally, the disclosed system utilizes the mappings of electronic survey questions to domain classifications to determine whether to deduplicate specific questions that are semantically similar and within the same domain classifications. For instance, the disclosed system utilizes natural language processing to find semantically similar questions across a plurality of electronic surveys and deduplicate the similar questions if their domain classifications are the same.

IPC Classes  ?

29.

Systems and methods for identifying data processing activities based on data discovery results

      
Application Number 18183435
Grant Number 11921865
Status In Force
Filing Date 2023-03-14
First Publication Date 2023-07-06
Grant Date 2024-03-05
Owner OneTrust, LLC (USA)
Inventor
  • Brannon, Jonathan Blake
  • Jones, Kevin
  • Pitchaimani, Saravanan
  • Patton-Kuhl, Dylan D.
  • Malladi, Ramana
  • Viswanathan, Subramanian

Abstract

Aspects of the present invention provide methods, apparatuses, systems, computing devices, computing entities, and/or the like for identifying data processing activities associated with various data assets based on data discovery results. In accordance various aspects, a method is provided comprising: identifying and scanning data assets to detect a subset of the data assets, wherein each asset of the subset is associated with a particular data element used for target data; generating a prediction for each pair of data assets of the subset on the target data flowing between the pair; identifying a data flow for the target data based on the prediction generated for each pair; and identifying a data processing activity associated with handling the target data based on a correlation identified for the particular data element, the subset, and/or the data flow with a known data element, subset, and/or data flow for the data processing activity.

IPC Classes  ?

  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 21/60 - Protecting data
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06N 20/00 - Machine learning
  • G06V 30/24 - Character recognition characterised by the processing or recognition method

30.

DATA PROCESSING SYSTEMS FOR FULFILLING DATA SUBJECT ACCESS REQUESTS AND RELATED METHODS

      
Application Number 18117190
Status Pending
Filing Date 2023-03-03
First Publication Date 2023-06-29
Owner OneTrust, LLC (USA)
Inventor
  • Barday, Kabir A.
  • Sabourin, Jason L.
  • Brannon, Jonathan Blake
  • Karanjkar, Mihir S.
  • Jones, Kevin

Abstract

Various Data Subject Access Request (DSAR) processing systems are adapted for presenting a first webform on a first web site, the first webform being adapted to receive DSAR's and to route the requests to a first designated individual for processing; presenting a second webform on a second web site, the second webform being adapted to receive DSAR's and to route the requests to a second designated individual for processing; receiving, via the first webform, a first DSAR; at least partially in response to the receiving the first DSAR, automatically routing the first DSAR to the first designated individual for handling; receiving, via the second webform, a second DSAR; at least partially in response to the receiving the second DSAR, automatically routing the second DSAR to the second designated individual for handling; and communicating a status of both the first DSAR and the second DSAR via a single user interface.

IPC Classes  ?

  • G06Q 10/0635 - Risk analysis of enterprise or organisation activities
  • G06Q 10/067 - Enterprise or organisation modelling
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 15/76 - Architectures of general purpose stored program computers

31.

DATA-PROCESSING CONSENT REFRESH, RE-PROMPT, AND RECAPTURE SYSTEMS AND RELATED METHODS

      
Application Number 18116791
Status Pending
Filing Date 2023-03-02
First Publication Date 2023-06-29
Owner OneTrust, LLC (USA)
Inventor
  • Brannon, Jonathan Blake
  • Hill, Casey
  • Jones, Kevin
  • Beaumont, Richard A.

Abstract

In various embodiments, a Consent Refresh, Re-Prompt, and Recapture System is configured to interface with a Consent Receipt Management System in order to, for example: (1) monitor previously provided consent by one or more data subjects that may be subject to future expiration; (2) monitor a data subject's activity to anticipate the data subject attempting an activity that may require a level of consent (e.g., for the processing of particular data subject data) that is higher than the system has received; and/or (3) identify other changes in circumstances or triggering events for a data subject that may warrant a refresh or recapture (e.g., or attempted capture) of a particular required consent (e.g., required to enable an entity to properly or legally execute a transaction with a data subject). The system may then be configured to automatically refresh, re-prompt for, and/or recapture consent as necessary.

IPC Classes  ?

  • G06F 16/958 - Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
  • G06F 16/957 - Browsing optimisation, e.g. caching or content distillation
  • G06F 16/951 - Indexing; Web crawling techniques
  • G06F 40/174 - Form filling; Merging

32.

DATA PROCESSING CONSENT SHARING SYSTEMS AND RELATED METHODS

      
Application Number 18110511
Status Pending
Filing Date 2023-02-16
First Publication Date 2023-06-22
Owner OneTrust, LLC (USA)
Inventor
  • Brannon, Jonathan Blake
  • Beaumont, Richard A.

Abstract

In various embodiments, an entity may provide a WebView where a transaction between an entity and a data subject may be performed. As described herein, the transaction may involve the collection or processing of personal data associated with the data subject by the entity as part of a processing activity undertaken by the entity that the data subject is consenting to as part of the transaction. Additionally, the entity may provide a native application where the transactions between the entity and a data subject may be performed. In some embodiments, the system may be configured to share consent data between the WebView and the native application so data subjects experience a seamless transition while using either the WebView or the native application, and the data subjects are not required to go through a consent workflow for each of the WebView and the native application.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules

33.

DATA PROCESSING SYSTEMS AND METHODS FOR AUTOMATICALLY DETECTING AND DOCUMENTING PRIVACY-RELATED ASPECTS OF COMPUTER SOFTWARE

      
Application Number 18112149
Status Pending
Filing Date 2023-02-21
First Publication Date 2023-06-22
Owner OneTrust, LLC (USA)
Inventor
  • Malhotra, Priya
  • Barday, Kabir A.
  • Karanjkar, Mihir S.
  • Finch, Steven W.
  • Browne, Ken A.
  • Heard, Nathan W.
  • Patel, Aakash H.
  • Sabourin, Jason L.
  • Daniel, Richard L.
  • Patton-Kuhl, Dylan D.
  • Brannon, Jonathan Blake

Abstract

Data processing systems and methods according to various embodiments are adapted for automatically detecting and documenting privacy-related aspects of computer software. Particular embodiments are adapted for: (1) automatically scanning source code to determine whether the source code include instructions for collecting personal data; and (2) facilitating the documentation of the portions of the code that collect the personal data. For example, the system may automatically prompt a user for comments regarding the code. The comments may be used, for example, to populate: (A) a privacy impact assessment; (B) system documentation; and/or (C) a privacy-related data map. The system may comprise, for example, a privacy comment plugin for use in conjunction with a code repository.

IPC Classes  ?

  • G06F 16/28 - Databases characterised by their database models, e.g. relational or object models
  • H04L 9/40 - Network security protocols
  • G06N 20/00 - Machine learning
  • G06F 16/25 - Integrating or interfacing systems involving database management systems
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 15/76 - Architectures of general purpose stored program computers
  • G06Q 10/06 - Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
  • H04L 67/306 - User profiles
  • H04W 12/02 - Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
  • G06F 40/186 - Templates

34.

Data processing consent capture systems and related methods

      
Application Number 18109556
Grant Number 11847182
Status In Force
Filing Date 2023-02-14
First Publication Date 2023-06-22
Grant Date 2023-12-19
Owner OneTrust, LLC (USA)
Inventor
  • Brannon, Jonathan Blake
  • Whitney, Patrick

Abstract

In various embodiments, a data processing consent capture system may be configured to prompt the data subject to consent to one or more types of data processing (e.g., to provide a desired consent) in response to identifying particular cookies (e.g., or types of data processing) that a data subject has not consented to. The system may, for example, substantially automatically prompt the data subject to consent for one or more particular types of data processing in response to determining that the user (e.g., data subject) has requested that a website or other system perform one or more functions that are not possible without a particular type of consent from the data subject. The system may, for example, prompt the user to consent in time for a certain interaction with the website, application, etc.

IPC Classes  ?

  • G06F 9/44 - Arrangements for executing specific programs
  • G06F 16/958 - Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
  • G06F 16/957 - Browsing optimisation, e.g. caching or content distillation
  • G06F 16/951 - Indexing; Web crawling techniques
  • G06F 40/174 - Form filling; Merging

35.

Data processing systems and methods for automatically blocking the use of tracking tools

      
Application Number 18104981
Grant Number 11960564
Status In Force
Filing Date 2023-02-02
First Publication Date 2023-06-08
Grant Date 2024-04-16
Owner OneTrust, LLC (USA)
Inventor
  • Whitney, Patrick
  • Jones, Kevin
  • Kelly, Brian
  • Viswanathan, Subramanian
  • Hill, Casey
  • Baucom, Jeffrey
  • Kunhambu, Madhusudhan
  • Babu, Mithun
  • Kesavan, Rajneesh
  • Koti, Santosh Kumar
  • Gopalakrishnan, Sathish
  • Balasubramanian, Anand
  • Kabad, Mohamed
  • Puthenveetil, Jayamohan
  • Brannon, Jonathan Blake

Abstract

Data processing systems and methods, according to various embodiments, are adapted for determining a categorization for each tracking tool that executes on a particular webpage based on a variety of criteria, such as the purpose of the tracking tool and its source script. The system may compare the characteristics of tracking tools on a webpage to a database of known tracking tools to determine the appropriate categorization. When a user visits the webpage, the system analyzes these categories and determines whether the tracking tool should be permitted to run based on the categories and/or other criteria, such as whether the user has consented to the use of that type of tracking tool.

IPC Classes  ?

  • G06F 16/95 - Retrieval from the web
  • G06F 16/957 - Browsing optimisation, e.g. caching or content distillation
  • G06F 16/958 - Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking

36.

DATA PROCESSING SYSTEMS FOR DATA TRANSFER RISK IDENTIFICATION AND RELATED METHODS

      
Application Number 18099799
Status Pending
Filing Date 2023-01-20
First Publication Date 2023-05-25
Owner OneTrust, LLC (USA)
Inventor
  • Brannon, Jonathan Blake
  • Jones, Kevin
  • Patton-Kuhl, Dylan D.
  • Kveen, Bryan Patrick
  • Pavlichek, Nicholas Ian
  • Crawford, Eliza Rose

Abstract

A data processing central consent repository system may be configured to, for example: (1) identify a form used to collect one or more pieces of personal data, (2) determine a data asset of a plurality of data assets of the organization where input data of the form is transmitted, (3) add the data asset to the third-party data repository with an electronic link to the form, (4) in response to a user submitting the form, create a unique subject identifier to submit to the third-party data repository and, along with the form data provided by the user in the form, to the data asset, (5) submit the unique subject identifier and the form data provided by the user to the third-party data repository and the data asset, and (6) digitally store the unique subject identifier and the form data in the third-party data repository and the data asset.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 16/951 - Indexing; Web crawling techniques
  • G06F 16/955 - Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
  • G06F 40/174 - Form filling; Merging

37.

Data processing systems for cookie compliance testing with website scanning and related methods

      
Application Number 18096935
Grant Number 11868507
Status In Force
Filing Date 2023-01-13
First Publication Date 2023-05-18
Grant Date 2024-01-09
Owner OneTrust, LLC (USA)
Inventor
  • Brannon, Jonathan Blake
  • Bokade, Raju
  • Proctor, Austin
  • Babu, Mithun
  • Kunhambu, Madhusudhan

Abstract

A system and method for determining consent user interface validity for a provided consent user interface of a web form presenting consent information, comprising: accessing a consent user interface presented on a web form; determining one or more configuration attributes of the consent user interface; accessing one or more privacy regulations associated with presenting consent information; comparing the one or more configuration attributes of the consent user interface to each of the one or more privacy regulations; determining whether the consent user interface is compliant with each of the one or more privacy regulations; and in response to determining that the consent user interface is not compliant with one or more privacy regulations, flagging the consent user interface.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 16/958 - Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
  • G06F 21/60 - Protecting data

38.

DETECTING CONFIGURATION GAPS IN SYSTEMS HANDLING DATA ACCORDING TO SYSTEM REQUIREMENTS FRAMEWORKS

      
Application Number 18151335
Status Pending
Filing Date 2023-01-06
First Publication Date 2023-05-11
Owner OneTrust LLC (USA)
Inventor
  • Bates, Evan
  • Sabourin, Jason L
  • Jones, Kevin
  • Murray, Patrick Glenn
  • Kwong, Carman

Abstract

Methods, systems, and non-transitory computer readable storage media are disclosed for managing computing systems according to detect and correct configuration gaps with specific system requirements frameworks. Specifically, the disclosed system accesses a digital data repository to determine attribute values of data objects representing functions or infrastructure associated with handling target data for an entity. The disclosed system determines a digital representation of a system requirements framework that indicates controls associated with handling specific data types. Based on the attribute values and a gap rules set associated with the system requirements framework, the disclosed system determines configuration gaps to be addressed via control actions for installing controls in connection with various data assets or data processing operations. The disclosed system generates tasks to display via a graphical user interface of a computing device for applying modifications to the data assets and/or data processing operations to address the configuration gaps.

IPC Classes  ?

39.

Data processing systems and methods for automatically protecting sensitive data within privacy management systems

      
Application Number 18091750
Grant Number 11947708
Status In Force
Filing Date 2022-12-30
First Publication Date 2023-05-04
Grant Date 2024-04-02
Owner OneTrust, LLC (USA)
Inventor
  • Brannon, Jonathan Blake
  • Jones, Kevin
  • Pitchaimani, Saravanan
  • Turk, Jeremy

Abstract

In particular embodiments, a sensitive data management system is configured to remove sensitive data after a period of non-use. Credentials used to access remote systems and/or third-party systems are stored with metadata that is updated with each use of the credentials. After a period of non-use, determined based on credential metadata, the credentials are deleted. Personal data retrieved to process a consumer request is stored with metadata that is updated with each use of the personal data. After a period of non-use, determined based on personal data metadata, the personal data is deleted. The personal data is also deleted if the system determines that the process or system that caused the personal data to be retrieved is no longer in use. An encrypted version of personal data may be stored for later use in verifying proper consumer request fulfillment.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 3/0482 - Interaction with lists of selectable items, e.g. menus
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules

40.

Limiting usage of physical emissions sources by utilizing a modified gradient descent model

      
Application Number 17592878
Grant Number 11703844
Status In Force
Filing Date 2022-02-04
First Publication Date 2023-04-13
Grant Date 2023-07-18
Owner One Trust LLC (USA)
Inventor
  • Avadhani, Madan
  • Dandamudi, Akhil
  • Jooma, Sohail
  • Redman, Phil
  • Hill, Casey
  • Quintas, Daniel B

Abstract

Methods, systems, and non-transitory computer readable storage media are disclosed for generating action recommendations modifying physical emissions sources of an entity based on past and modeled emissions for the entity. Specifically, the disclosed system monitors emissions produced by an entity by determining a number of emissions sources corresponding to an entity and a plurality of emissions values for the emissions sources. Additionally, the disclosed system determines a plurality of constraints corresponding to the entity. The disclosed system also determines goals for the entity including target emissions values. The disclosed system utilizes a modified gradient descent model to iteratively adjust emissions values for the physical emissions sources to obtain the target emissions values according to the constraints. The disclosed system generates action recommendations for modifying the physical emissions sources utilizing the modified gradient descent model and provides the action recommendations for display within a graphical user interface.

IPC Classes  ?

  • G05B 15/02 - Systems controlled by a computer electric
  • G05B 23/02 - Electric testing or monitoring
  • G06Q 50/06 - Electricity, gas or water supply
  • G06F 3/04847 - Interaction techniques to control parameter settings, e.g. interaction with sliders or dials
  • G06F 40/40 - Processing or translation of natural language
  • G06N 3/04 - Architecture, e.g. interconnection topology

41.

GENERATING ACTION RECOMMENDATIONS FOR MODIFYING PHYSICAL EMISSIONS SOURCES UTILIZING A MODIFIED GRADIENT DESCENT MODEL

      
Application Number US2022015255
Publication Number 2023/059364
Status In Force
Filing Date 2022-02-04
Publication Date 2023-04-13
Owner ONETRUST LLC (USA)
Inventor
  • Avadhani, Madan
  • Dandamudi, Akhil
  • Jooma, Sohail
  • Redman, Phil
  • Hill, Casey
  • Quintas, Daniel, B.

Abstract

Methods, systems, and non-transitory computer readable storage media are disclosed for generating action recommendations modifying physical emissions sources of an entity based on past and modeled emissions for the entity. Specifically, the disclosed system monitors emissions produced by an entity by determining a number of emissions sources corresponding to an entity and a plurality of emissions values for the emissions sources. Additionally, the disclosed system determines a plurality of constraints corresponding to the entity. The disclosed system also determines goals for the entity including target emissions values. The disclosed system utilizes a modified gradient descent model to iteratively adjust emissions values for the physical emissions sources to obtain the target emissions values according to the constraints. The disclosed system generates action recommendations for modifying the physical emissions sources utilizing the modified gradient descent model and provides the action recommendations for display within a graphical user interface.

IPC Classes  ?

  • G06Q 10/00 - Administration; Management
  • G06Q 10/04 - Forecasting or optimisation specially adapted for administrative or management purposes, e.g. linear programming or "cutting stock problem"
  • G06Q 10/06 - Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling

42.

GENERATING ACTION RECOMMENDATIONS FOR MODIFYING PHYSICAL EMISSION SOURCES BASED ON MANY SIMULATIONS OF DIFFERENT SCENARIOS UTILIZING A MODIFIED GRADIENT DESCENT MODEL

      
Application Number 17650724
Status Pending
Filing Date 2022-02-11
First Publication Date 2023-04-13
Owner OneTrust LLC (USA)
Inventor
  • Avadhani, Madan
  • Dandamudi, Akhil

Abstract

Methods, systems, and non-transitory computer readable storage media are disclosed for generating action recommendations for modifying physical emissions sources based on a plurality of simulations of different scenarios utilizing a modified gradient descent model. Specifically, the disclosed system utilizes the modified gradient descent model to generate emissions value modifications for physical emissions sources corresponding to an entity based on a set of constraints and target emissions values. The disclosed system runs a plurality of simulations to generate modified target emissions values, utilizing the modified gradient descent model, by modifying source attributes of the physical emissions sources according to a plurality of probability distributions representing source attributes of the physical emissions sources. The disclosed system then compares the initial target emissions values to the modified target emissions values determined from the simulations to generate action recommendations for modifying the physical emissions sources.

IPC Classes  ?

  • G06N 7/00 - Computing arrangements based on specific mathematical models

43.

Generating forecasted emissions value modifications and monitoring for physical emissions sources utilizing machine-learning models

      
Application Number 17651388
Grant Number 11709485
Status In Force
Filing Date 2022-02-16
First Publication Date 2023-04-13
Grant Date 2023-07-25
Owner OneTrust LLC (USA)
Inventor
  • Avadhani, Madan
  • Dandamudi, Akhil

Abstract

Methods, systems, and non-transitory computer readable storage media are disclosed for generating action recommendations for generating action recommendations for modifying physical emissions sources of an entity based on forecasting and monitoring emissions production for the entity utilizing machine-learning models. Specifically, the disclosed system forecasts emissions produced by an entity by utilizing a plurality of different forecasting machine-learning models corresponding to different physical emissions sources to generate forecasted source attributes. Additionally, the disclosed system combines the forecasted source attributes to generate a plurality of forecasted emissions value modifications for a future time period. The disclosed system generates action recommendations for modifying the physical emissions sources based on the forecasted emissions value modifications. In additional embodiments, the disclosed system tracks emissions of the entity during the future time period and generate additional action recommendations in response to detecting deviations from forecasted emissions production.

IPC Classes  ?

  • G06N 3/04 - Architecture, e.g. interconnection topology
  • G06Q 10/04 - Forecasting or optimisation specially adapted for administrative or management purposes, e.g. linear programming or "cutting stock problem"
  • G06N 3/045 - Combinations of networks

44.

GENERATING ACTION RECOMMENDATIONS FOR MODIFYING PHYSICAL EMISSION SOURCES BASED ON MANY SIMULATIONS OF DIFFERENT SCENARIOS UTILIZING A MODIFIED GRADIENT DESCENT MODEL

      
Application Number US2022070629
Publication Number 2023/059943
Status In Force
Filing Date 2022-02-11
Publication Date 2023-04-13
Owner ONETRUST LLC (USA)
Inventor
  • Avadhani, Madan
  • Dandamudi, Akhil

Abstract

Methods, systems, and non-transitory computer readable storage media are disclosed for generating action recommendations for modifying physical emissions sources based on a plurality of simulations of different scenarios utilizing a modified gradient descent model. Specifically, the disclosed system utilizes the modified gradient descent model to generate emissions value modifications for physical emissions sources corresponding to an entity based on a set of constraints and target emissions values. The disclosed system runs a plurality of simulations to generate modified target emissions values, utilizing the modified gradient descent model, by modifying source attributes of the physical emissions sources according to a plurality of probability distributions representing source attributes of the physical emissions sources. The disclosed system then compares the initial target emissions values to the modified target emissions values determined from the simulations to generate action recommendations for modifying the physical emissions sources.

IPC Classes  ?

  • G06Q 10/00 - Administration; Management
  • G06Q 10/04 - Forecasting or optimisation specially adapted for administrative or management purposes, e.g. linear programming or "cutting stock problem"
  • G06Q 10/06 - Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling

45.

GENERATING FORECASTED EMISSIONS VALUE MODIFICATIONS AND MONITORING FOR PHYSICAL EMISSIONS SOURCES UTILIZING MACHINE-LEARNING MODELS

      
Application Number US2022070685
Publication Number 2023/059944
Status In Force
Filing Date 2022-02-16
Publication Date 2023-04-13
Owner ONETRUST LLC (USA)
Inventor
  • Avadhani, Madan
  • Dandamudi, Akhil

Abstract

Methods, systems, and non-transitory computer readable storage media are disclosed for generating action recommendations for generating action recommendations for modifying physical emissions sources of an entity based on forecasting and monitoring emissions production for the entity utilizing machine-learning models. Specifically, the disclosed system forecasts emissions produced by an entity by utilizing a plurality of different forecasting machine-learning models corresponding to different physical emissions sources to generate forecasted source attributes. Additionally, the disclosed system combines the forecasted source attributes to generate a plurality of forecasted emissions value modifications for a future time period. The disclosed system generates action recommendations for modifying the physical emissions sources based on the forecasted emissions value modifications. In additional embodiments, the disclosed system tracks emissions of the entity during the future time period and generate additional action recommendations in response to detecting deviations from forecasted emissions production.

IPC Classes  ?

  • G06Q 10/00 - Administration; Management
  • G06Q 10/04 - Forecasting or optimisation specially adapted for administrative or management purposes, e.g. linear programming or "cutting stock problem"
  • G06Q 10/06 - Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling

46.

DATA PROCESSING SYSTEMS FOR VALIDATING AUTHORIZATION FOR PERSONAL DATA COLLECTION, STORAGE, AND PROCESSING

      
Application Number 17963012
Status Pending
Filing Date 2022-10-10
First Publication Date 2023-04-06
Owner OneTrust, LLC (USA)
Inventor
  • Jones, Kevin
  • Brannon, Jonathan Blake
  • Hill, Casey
  • Beaumont, Richard A.

Abstract

In particular embodiments, a data processing consent management system may be configured to utilize one or more age verification techniques to at least partially authenticate the data subject's ability to provide valid consent (e.g., under one or more prevailing legal requirements) in order to collect, store, and or process the subject's personal data. For example, according to one or more particular legal or industry requirements, an individual (e.g., data subject) may need to be at least a particular age (e.g., an age of majority, an adult, over 18, over 21, over 13, or any other suitable age) in order to provide valid consent. Data processing systems may generate and store one or more consent records memorializing valid consent for data processing from data subjects in response to confirming that the data subject is old enough to provide such consent.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 21/60 - Protecting data

47.

AUTO-BLOCKING SOFTWARE DEVELOPMENT KITS BASED ON USER CONSENT

      
Application Number US2022045520
Publication Number 2023/056085
Status In Force
Filing Date 2022-10-03
Publication Date 2023-04-06
Owner ONETRUST, LLC (USA)
Inventor
  • Doshi, Pratik
  • Wyckoff, Spencer

Abstract

Aspects of the present invention provide methods, apparatuses, systems, computing devices, computing entities, and/or the like for auto-blocking of software development kit functionality for mobile software applications based on consent (or lack thereof) provided by users who are interacting with the mobile software applications.

IPC Classes  ?

  • G06F 8/35 - Creation or generation of source code model driven
  • G06F 8/38 - Creation or generation of source code for implementing user interfaces
  • G06F 8/30 - Creation or generation of source code
  • G06F 8/20 - Software design
  • G06F 21/60 - Protecting data
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules

48.

Generating and customizing user interfaces for demonstrating functions of interactive user environments

      
Application Number 17831713
Grant Number 11620142
Status In Force
Filing Date 2022-06-03
First Publication Date 2023-04-04
Grant Date 2023-04-04
Owner OneTrust, LLC (USA)
Inventor Friis, Emil

Abstract

In general, various aspects of the present invention provide methods, apparatuses, systems, computing devices, computing entities, and/or the like for generating customized user interfaces. In accordance with various aspects, a method is provided that comprises: providing a content generation interface that includes control elements for selecting interactive content; receiving, via the control elements, a selection of a set of webpages comprising the interactive content; configuring, based on the selection, the interactive content to be displayed via browser tabs by: including a set of object identifiers, wherein each object identifier represents a corresponding webpage that is to be displayed via a browser tab; and transmitting an instruction to a browser application executing on a target device causing the browser application to launch browser tabs to display the interactive content by displaying the corresponding webpage via a browser tab of the browser tabs.

IPC Classes  ?

  • G06F 3/0482 - Interaction with lists of selectable items, e.g. menus
  • G06F 9/451 - Execution arrangements for user interfaces
  • G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range

49.

INTELLIGENT GRAPH FOR REPRESENTING DATA OBJECTS

      
Application Number US2022044574
Publication Number 2023/049373
Status In Force
Filing Date 2022-09-23
Publication Date 2023-03-30
Owner ONETRUST, LLC (USA)
Inventor
  • Viswanathan, Subramanian
  • Shah, Milap

Abstract

The present disclosure provides methods, apparatus, systems, computing devices, computing entities, and/or the like for providing persistent representations in graph data structures of relationships that exist among data objects found across different data-related processes to enable efficient querying of data from the different data-related processes.

IPC Classes  ?

50.

Identifying similar documents in a file repository using unique document signatures

      
Application Number 17664471
Grant Number 11593439
Status In Force
Filing Date 2022-05-23
First Publication Date 2023-02-28
Grant Date 2023-02-28
Owner OneTrust LLC (USA)
Inventor
  • Avadhani, Madan
  • Sharma, Swapnil

Abstract

Methods, systems, and non-transitory computer readable storage media are disclosed for determining clusters of similar digital documents using unique document signatures. Specifically, the disclosed system processes digital text in a digital document to tokenize character strings (e.g., words) in the digital document by combining a subset of character values and string lengths in the character strings. Additionally, the disclosed system generates a document signature for the digital document by combining subsets of tokens generated for the digital document into a token sequence indicative of the digital text in the digital document. The disclosed system determines a cluster of similar digital documents including the digital document by comparing the document signature of the digital document to document signatures corresponding to a plurality of digital documents.

IPC Classes  ?

  • G06F 16/93 - Document management systems
  • G06F 40/284 - Lexical analysis, e.g. tokenisation or collocates
  • G06F 16/35 - Clustering; Classification
  • G06F 16/31 - Indexing; Data structures therefor; Storage structures

51.

SYSTEMS AND METHODS FOR VERSIONING A GRAPH DATABASE

      
Application Number 17890494
Status Pending
Filing Date 2022-08-18
First Publication Date 2023-02-23
Owner OneTrust, LLC (USA)
Inventor
  • Smits, Ramon
  • Kallarakuzhi, Ashok
  • Finch, Steven W.
  • Strahl, Chris

Abstract

Embodiments of the present invention provide methods, systems, and/or the like for versioning a graph representation in a graph data structure. In accordance with one embodiment, a method is provided comprising: conducting a plurality of iterations involving: validating a first data source comprising a new version of data based on a schema from a plurality of schemas in which each schema corresponds to a graph representation found in a graph data structure; and identifying errors in the first source based on the validating of the source; identifying an applicable schema as a schema producing fewer errors than at least one other schema; comparing the first source with a second source comprising a previous version of the data to identify a difference; generating a query for the difference based on the applicable schema; and providing the query for execution to migrate the difference into the graph representation.

IPC Classes  ?

  • G06F 16/21 - Design, administration or maintenance of databases
  • G06F 16/901 - Indexing; Data structures therefor; Storage structures

52.

Assessing and managing computational risk involved with integrating third party computing functionality within a computing system

      
Application Number 17977285
Grant Number 11816224
Status In Force
Filing Date 2022-10-31
First Publication Date 2023-02-16
Grant Date 2023-11-14
Owner OneTrust, LLC (USA)
Inventor
  • Sabourin, Jason L.
  • Patel, Shiven

Abstract

In general, various aspects of the present disclosure provide methods, apparatuses, systems, computing devices, computing entities, and/or the like for addressing a modified risk rating identifying a risk to an entity of having computer-implemented functionality provided by a vendor integrated with a computing system of the entity. In accordance various aspects, a method is provided that comprises: receiving a first assessment dataset for computer-implemented functionality; detecting an inconsistency between a value of an attribute for the computer-implemented functionality specified in the first assessment dataset and a corresponding value of the attribute specified in a second assessment dataset for the computer-implemented functionality; modifying a risk rating that identifies a risk to the entity of having the computer-implemented functionality integrated with the computing system to generate a modified risk rating based on the inconsistency; and in response, performing an action with respect to the computing system to address the modified risk rating.

IPC Classes  ?

  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 9/54 - Interprogram communication
  • G06Q 10/0635 - Risk analysis of enterprise or organisation activities

53.

DATA PROCESSING SYSTEMS AND METHODS FOR BUNDLED PRIVACY POLICIES

      
Application Number 17962470
Status Pending
Filing Date 2022-10-08
First Publication Date 2023-02-16
Owner OneTrust, LLC (USA)
Inventor
  • Beaumont, Richard A.
  • Brannon, Jonathan Blake

Abstract

Data processing systems and methods, according to various embodiments, are adapted for determining an applicable privacy policy based on various criteria associated with a user and the associated product or service. User and product criteria may be obtained automatically and/or based on user input and analyzed by a privacy policy rules engine to determine the applicable policy. Text from the applicable policy can then be presented to the user. A default policy can be used when no particular applicable policy can be identified using by the rules engine. Policies may be ranked or prioritized so that a policy can be selected in the event the rules engine identifies two, conflicting policies based on the criteria.

IPC Classes  ?

  • G06Q 10/06 - Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 15/76 - Architectures of general purpose stored program computers

54.

COMPUTING PLATFORM FOR FACILITATING DATA EXCHANGE AMONG COMPUTING ENVIRONMENTS

      
Application Number 17881076
Status Pending
Filing Date 2022-08-04
First Publication Date 2023-02-09
Owner OneTrust, LLC (USA)
Inventor
  • Patel, Shiven
  • Sabourin, Jason L.
  • John, Sinu
  • George, Siju
  • R., Ashish
  • Umadi, Shivakumar
  • Rao, Sahaj

Abstract

Various aspects of the disclosure provide methods, apparatus, systems, computing devices, computing entities, and/or the like for facilitating the exchange of data among a diverse group of first and third party computing environments. Accordingly, various aspects of the disclosure provide a data exchange computing platform that facilitates data exchange among a diverse group of first and third party computing environments. In some aspects, the data exchange computing platform provides a data exchange service available to various first and third parties who wish to exchange data.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules

55.

PARTNER FOR TRUST TRANSFORMATION

      
Application Number 223804300
Status Pending
Filing Date 2023-02-07
Owner OneTrust LLC (USA)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 35 - Advertising and business services
  • 42 - Scientific, technological and industrial services, research and design
  • 45 - Legal and security services; personal services for individuals.

Goods & Services

(1) Downloadable software for monitoring, tracking and auditing compliance with, and providing training in laws, regulations, and standards and internal policies in the fields of data privacy, data security, data collection, data governance, risk, ethics, environmental sustainability and responsibility, carbon accounting, reduction and offsetting, and environmental, social, and corporate governance (esg) and esg program management; downloadable software featuring software for managing vulnerabilities, threat modeling, assessing, auditing, managing, monitoring, framework mapping, data protection impact assessments, optimizing privacy compliance workflows and mitigating cybersecurity risk and for ensuring compliance with applicable privacy and security risk management standards and regulations (1) Software as a service (saas) services featuring software to monitor, track and audit compliance with, and provide training in laws, regulations, and standards, and internal policies in the fields of data privacy, data security, data collection, data governance, risk, ethics, environmental sustainability and responsibility, carbon accounting, reduction and offsetting, and environmental, social, and corporate governance (esg) and esg program management; saas services featuring software for data collection and to implement controls, assessments, training, incident reporting and disclosures, and policies, and to monitor, report, and communicate practices to others, all in the fields of data privacy, data security, data governance, risk, ethics, environmental sustainability and responsibility, carbon accounting, reduction and offsetting, and esg; saas services featuring software for data collection and to implement controls, assessments, training, incident reporting and disclosures, and policies, and to monitor, report, and communicate practices to others, all in the fields of data privacy, data security, data governance, risk, ethics, environmental sustainability and responsibility, carbon accounting, reduction and offsetting, and esg; data security and privacy consultancy, namely, providing cyber risk and privacy services in the nature of assessing security and privacy controls and procedures in place to identify and control access to data; assessing the processes and procedures in place to evaluate the cyber and privacy capabilities related to systems, people, assets, data, and capabilities; providing cybersecurity advisory services in the nature of system and data security consultancy related to identification, assessment, remediation of controls, processes, policies, and infrastructure; software as a service (saas) services featuring software for managing vulnerabilities, threat modeling, assessing, auditing, managing, monitoring, framework mapping, data protection impact assessments, optimizing privacy compliance workflows and mitigating cybersecurity risk and for ensuring compliance with applicable privacy and security risk management standards and regulations (2) Advisory services relating to data privacy, data security and mapping, data governance, risk, ethics, privacy impact assessments, creation and documentation of data protection officer roles; environmental sustainability, carbon accounting, and environmental, social, and corporate governance (esg); legal advisory services in the fields of data privacy, data security, data governance, risk, ethics, environmental sustainability, carbon accounting, and esg; provision of legal information in the fields of data privacy, data security, data governance, risk, ethics, environmental sustainability, carbon accounting, and esg

56.

BUILD TRUST. DEMONSTRATE IMPACT.

      
Application Number 223804400
Status Pending
Filing Date 2023-02-07
Owner OneTrust LLC (USA)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 35 - Advertising and business services
  • 42 - Scientific, technological and industrial services, research and design
  • 45 - Legal and security services; personal services for individuals.

Goods & Services

(1) Downloadable software for monitoring, tracking and auditing compliance with, and providing training in laws, regulations, and standards and internal policies in the fields of data privacy, data security, data collection, data governance, risk, ethics, environmental sustainability and responsibility, carbon accounting, reduction and offsetting, and environmental, social, and corporate governance (esg) and esg program management; downloadable software featuring software for managing vulnerabilities, threat modeling, assessing, auditing, managing, monitoring, framework mapping, data protection impact assessments, optimizing privacy compliance workflows and mitigating cybersecurity risk and for ensuring compliance with applicable privacy and security risk management standards and regulations (1) Software as a service (saas) services featuring software to monitor, track and audit compliance with, and provide training in laws, regulations, and standards, and internal policies in the fields of data privacy, data security, data collection, data governance, risk, ethics, environmental sustainability and responsibility, carbon accounting, reduction and offsetting, and environmental, social, and corporate governance (esg) and esg program management; saas services featuring software for data collection and to implement controls, assessments, training, incident reporting and disclosures, and policies, and to monitor, report, and communicate practices to others, all in the fields of data privacy, data security, data governance, risk, ethics, environmental sustainability and responsibility, carbon accounting, reduction and offsetting, and esg; saas services featuring software for data collection and to implement controls, assessments, training, incident reporting and disclosures, and policies, and to monitor, report, and communicate practices to others, all in the fields of data privacy, data security, data governance, risk, ethics, environmental sustainability and responsibility, carbon accounting, reduction and offsetting, and esg; data security and privacy consultancy, namely, providing cyber risk and privacy services in the nature of assessing security and privacy controls and procedures in place to identify and control access to data; assessing the processes and procedures in place to evaluate the cyber and privacy capabilities related to systems, people, assets, data, and capabilities; providing cybersecurity advisory services in the nature of system and data security consultancy related to identification, assessment, remediation of controls, processes, policies, and infrastructure; software as a service (saas) services featuring software for managing vulnerabilities, threat modeling, assessing, auditing, managing, monitoring, framework mapping, data protection impact assessments, optimizing privacy compliance workflows and mitigating cybersecurity risk and for ensuring compliance with applicable privacy and security risk management standards and regulations (2) Advisory services relating to data privacy, data security and mapping, data governance, risk, ethics, privacy impact assessments, creation and documentation of data protection officer roles; environmental sustainability, carbon accounting, and environmental, social, and corporate governance (esg); legal advisory services in the fields of data privacy, data security, data governance, risk, ethics, environmental sustainability, carbon accounting, and esg; provision of legal information in the fields of data privacy, data security, data governance, risk, ethics, environmental sustainability, carbon accounting, and esg

57.

TRUST INTELLIGENCE PLATFORM

      
Application Number 223804600
Status Pending
Filing Date 2023-02-07
Owner OneTrust LLC (USA)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

(1) Downloadable software for monitoring, tracking and auditing compliance with, and providing training in laws, regulations, and standards and internal policies in the fields of data privacy, data security, data collection, data governance, risk, ethics, environmental sustainability and responsibility, carbon accounting, reduction and offsetting, and environmental, social, and transparent, ethical and diverse governance (esg) and esg program management; downloadable software featuring software for managing vulnerabilities, threat modeling, assessing, auditing, managing, monitoring, framework mapping, data protection impact assessments, optimizing privacy compliance workflows and mitigating cybersecurity risk and for ensuring compliance with applicable privacy and security risk management standards and regulations (1) Software as a service (saas) services featuring software to monitor, track and audit compliance with, and provide training in laws, regulations, and standards, and internal policies in the fields of data privacy, data security, data collection, data governance, risk, ethics, environmental sustainability and responsibility, carbon accounting, reduction and offsetting, and environmental, social, and transparent, ethical and diverse governance (esg) and esg program management; saas services featuring software for data collection and to implement controls, assessments, training, incident reporting and disclosures, and policies, and to monitor, report, and communicate practices to others, all in the fields of data privacy, data security, data governance, risk, ethics, environmental sustainability and responsibility, carbon accounting, reduction and offsetting, and esg; saas services featuring software for data collection and to implement controls, assessments, training, incident reporting and disclosures, and policies, and to monitor, report, and communicate practices to others, all in the fields of data privacy, data security, data governance, risk, ethics, environmental sustainability and responsibility, carbon accounting, reduction and offsetting, and esg; data security and privacy consultancy, namely, providing cyber risk and privacy services in the nature of assessing security and privacy controls and procedures in place to identify and control access to data; assessing the processes and procedures in place to evaluate the cyber and privacy capabilities related to systems, people, assets, data, and capabilities; providing cybersecurity advisory services in the nature of system and data security consultancy related to identification, assessment, remediation of controls, processes, policies, and infrastructure; software as a service (saas) services featuring software for managing vulnerabilities, threat modeling, assessing, auditing, managing, monitoring, framework mapping, data protection impact assessments, optimizing privacy compliance workflows and mitigating cybersecurity risk and for ensuring compliance with applicable privacy and security risk management standards and regulations

58.

TRUST INTELLIGENCE

      
Application Number 223804700
Status Pending
Filing Date 2023-02-07
Owner OneTrust LLC (USA)
NICE Classes  ?
  • 35 - Advertising and business services
  • 42 - Scientific, technological and industrial services, research and design
  • 45 - Legal and security services; personal services for individuals.

Goods & Services

(1) Advisory services relating to data privacy, data security and mapping, data governance, risk, ethics, privacy impact assessments, creation and documentation of data protection officer roles; environmental sustainability, carbon accounting, and environmental, social, and transparent, ethical and diverse governance (esg); legal advisory services in the fields of data privacy, data security, data governance, risk, ethics, environmental sustainability, carbon accounting, and esg; provision of legal information in the fields of data privacy, data security, data governance, risk, ethics, environmental sustainability, carbon accounting, and esg

59.

TRUST INTELLIGENCE PLATFORM

      
Application Number 018833020
Status Registered
Filing Date 2023-02-07
Registration Date 2023-06-07
Owner OneTrust LLC (USA)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

downloadable software for monitoring, tracking and auditing compliance with, and providing training in laws, regulations, and standards and internal policies in the fields of data privacy, data security, data collection, data governance, risk, ethics, environmental sustainability and responsibility, carbon accounting, reduction and offsetting, and environmental, social, and corporate governance (esg) and esg program management; downloadable software featuring software for managing vulnerabilities, threat modeling, assessing, auditing, managing, monitoring, framework mapping, data protection impact assessments, optimizing privacy compliance workflows and mitigating cybersecurity risk and for ensuring compliance with applicable privacy and security risk management standards and regulations. Software as a service (SAAS) services featuring software to monitor, track and audit compliance with, and provide training in laws, regulations, and standards, and internal policies in the fields of data privacy, data security, data collection, data governance, risk, ethics, environmental sustainability and responsibility, carbon accounting, reduction and offsetting, and environmental, social, and transparent, ethical and diverse governance (ESG) and ESG program management; SAAS services featuring software for data collection and to implement controls, assessments, training, incident reporting and disclosures, and policies, and to monitor, report, and communicate practices to others, all in the fields of data privacy, data security, data governance, risk, ethics, environmental sustainability and responsibility, carbon accounting, reduction and offsetting, and ESG; data security and privacy consultancy, namely, providing cyber risk and privacy services in the nature of assessing security and privacy controls and procedures in place to identify and control access to data; assessing the processes and procedures in place to evaluate the cyber and privacy capabilities related to systems, people, assets, data, and capabilities; providing cybersecurity advisory services in the nature of system and data security consultancy related to identification, assessment, remediation of controls, processes, policies, and infrastructure; software as a service (SAAS) services featuring software for managing vulnerabilities, threat modeling, assessing, auditing, managing, monitoring, framework mapping, data protection impact assessments, optimizing privacy compliance workflows and mitigating cybersecurity risk and for ensuring compliance with applicable privacy and security risk management standards and regulations.

60.

SYSTEMS AND METHODS FOR IDENTIFYING TARGETED DATA

      
Application Number 17877440
Status Pending
Filing Date 2022-07-29
First Publication Date 2023-02-02
Owner OneTrust, LLC (USA)
Inventor Jones, Kevin

Abstract

The present disclosure provides methods, systems, computing devices, computing entities, and/or the like for identifying and/or retrieving targeted data found in unstructured documents. In accordance with various aspects, a method is provided that comprises: receiving, a targeted data request identifying a data subject; processing a first feature representation of each document of a plurality of documents using a classifier machine-learning model to generate a prediction that the document contains the targeted data; generating a dataset that comprises each document having a prediction that satisfy a threshold; processing a second feature representation of each document of the dataset using a clustering machine-learning model to identify a document cluster for the document; and providing the document clusters so that an analysis can be performed on each document cluster to eliminate the document cluster as having targeted data and/or identify the targeted data associated with the data subject found in the document cluster.

IPC Classes  ?

  • G06F 40/289 - Phrasal analysis, e.g. finite state techniques or chunking
  • G06V 30/414 - Extracting the geometrical structure, e.g. layout tree; Block segmentation, e.g. bounding boxes for graphics or text
  • G06F 40/30 - Semantic analysis
  • G06F 16/35 - Clustering; Classification

61.

DATA PROCESSING SYSTEMS AND METHODS FOR AUTOMATIC DISCOVERY AND ASSESSMENT OF MOBILE SOFTWARE DEVELOPMENT KITS

      
Application Number 17948036
Status Pending
Filing Date 2022-09-19
First Publication Date 2023-01-19
Owner OneTrust, LLC (USA)
Inventor
  • Jones, Kevin
  • Doshi, Pratik
  • Brannon, Jonathan Blake
  • Kumar, Prabhu

Abstract

A mobile application privacy analysis system is described, where the system scans a mobile device to identify files associated with a particular SDK and generates a tokenized name for the SDK. The tokenized name includes tokens representing the SDK vendor and one or more functions of the SDK. Using the tokenized name, the system then determines corresponding categories for each functionality token and score for each such category. Based on the scores, the system determines the most significant category and assigns that category to the SDK for use in privacy analysis. The system may also, or instead, determine a vendor category using the vendor token and assign that category to the SDK. Weighting factors may be applied to the scores for the categories associated with the functionality tokens and vendor tokens.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 16/955 - Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
  • G06F 16/904 - Browsing; Visualisation therefor
  • G06F 16/901 - Indexing; Data structures therefor; Storage structures

62.

SYSTEMS AND METHODS FOR AUTOMATICALLY BLOCKING THE USE OF TRACKING TOOLS

      
Application Number 17942242
Status Pending
Filing Date 2022-09-12
First Publication Date 2023-01-05
Owner OneTrust, LLC (USA)
Inventor
  • Brannon, Jonathan Blake
  • Whitney, Patrick
  • Chavva, Sharath Chandra
  • Baucom, Jeffrey

Abstract

Embodiments of the present invention provide methods, apparatus, systems, computing devices, computing entities, and/or the like for permitting or blocking tracking tools used through webpages. In particular embodiments, the method involves: scanning a webpage to identify a tracking tool configured for processing personal data; determining a data destination location that is associated with the tracking tool; and generating program code configured to: determine a location associated with a user who is associated with a rendering of the webpage; determine a prohibited data destination location based on the location associated with the user; determine that the data destination location associated with the tracking tool is not the prohibited data destination location; and responsive to the data destination location associated with the tracking tool not being the prohibited data destination location, permit the tracking tool to execute.

IPC Classes  ?

63.

DATA PROCESSING SYSTEMS AND METHODS FOR USING A DATA MODEL TO SELECT A TARGET DATA ASSET IN A DATA MIGRATION

      
Application Number 17887771
Status Pending
Filing Date 2022-08-15
First Publication Date 2022-12-08
Owner OneTrust, LLC (USA)
Inventor
  • Gunasingam, Arockia
  • Finch, Steven W.
  • Pitchaimani, Saravanan
  • Jones, Kevin
  • Brannon, Jonathan Blake

Abstract

A chat robot may be used to facilitate interaction with a user in the determination of whether to initiate and process a data subject access request (DSAR). At a DSAR submission webpage, the chatbot may interact with a user to determine the information the user is in need of and/or the actions that the user may take. The chatbot may provide the information, avoiding the processing overhead of submission and fulfillment of a DSAR. In addition, data stored on a data asset may be migrated to another data asset while maintaining compliance to applicable regulations. Based on the type of data stored by that data asset and the applicable regulations, requirements, and/or restrictions that relate to a transfer of that type data from that data asset, a target data asset may be determined. The data stored on the data asset may then be transferred to the target data asset.

IPC Classes  ?

  • G06F 3/06 - Digital input from, or digital output to, record carriers

64.

Automated risk assessment module with real-time compliance monitoring

      
Application Number 17869144
Grant Number 11792222
Status In Force
Filing Date 2022-07-20
First Publication Date 2022-11-17
Grant Date 2023-10-17
Owner OneTrust LLC (USA)
Inventor
  • Murray, Patrick Glenn
  • Kwong, Carman
  • Cross, Christopher
  • Costa Moreno, Jose
  • Shergill, Harpreet
  • Callin, Keegan

Abstract

Techniques are disclosed for usage-tracking of various information security (InfoSec) entities for tenants/organization onboarded on an instant multi-tenant security assurance platform. The InfoSec entities include policies, procedures, controls and evidence tasks. A policy or procedure is enforced by implementing one or more controls, and the collection of one or more evidence tasks proves/verifies the implementation of a control. The InfoSec entities are linked to each other across the platform and accrue a number of benefits for the tenants. These include generating a security questionnaire response (SQR), defining a readiness project and an audit project, sharing InfoSec entities encompassing the various products of a tenant, automating risk assessment, automatic collection of evidence tasks for verifying the implementation and/or operational state/status of various mitigating controls, etc.

IPC Classes  ?

65.

CONSENT CONVERSION OPTIMIZATION SYSTEMS AND RELATED METHODS

      
Application Number 17872266
Status Pending
Filing Date 2022-07-25
First Publication Date 2022-11-10
Owner OneTrust, LLC (USA)
Inventor
  • Brannon, Jonathan Blake
  • Jones, Kevin
  • Whitney, Patrick
  • Babu, Mithun
  • Chavva, Sharath Chandra

Abstract

In particular embodiments, a consent conversion optimization system is configured to test two or more test consent interfaces against one another to determine which of the two or more consent interfaces results in a higher conversion percentage (e.g., to determine which of the two or more interfaces lead to a higher number of end users and/or data subjects providing a requested level of consent for the creation, storage and use or cookies by a particular website). The system may, for example, analyze end user interaction with each particular test consent interface to determine which of the two or more user interfaces: (1) result in a higher incidence of a desired level of provided consent; (2) are easier to use by the end users and/or data subjects (e.g., take less time to complete, require a fewer number of clicks, etc.); (3) etc.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06Q 30/02 - Marketing; Price estimation or determination; Fundraising
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules

66.

DATA PROCESSING SYSTEMS AND METHODS FOR PROVIDING TRAINING IN A VENDOR PROCUREMENT PROCESS

      
Application Number 17869504
Status Pending
Filing Date 2022-07-20
First Publication Date 2022-11-10
Owner OneTrust, LLC (USA)
Inventor
  • Brannon, Jonathan Blake
  • Barday, Kabir A.

Abstract

Data processing systems and methods, according to various embodiments, are adapted for performing a process of procuring a vendor and sub-processes associated therewith, such as performing vendor risk assessments and providing training specific to the procurement of that particular vendor. Training requirements for the user procuring the vendor and/or for the vendor itself are determined and any deficiencies in current, valid training requirements are identified. Training to address any identified deficiencies is provided as part of the vendor procurement process. Training may be customized based on trainee and/or organization attributes to improve the effectiveness of such training.

IPC Classes  ?

  • G06Q 10/06 - Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 15/76 - Architectures of general purpose stored program computers

67.

Data processing systems and methods for preventing execution of an action documenting a consent rejection

      
Application Number 17872084
Grant Number 11704440
Status In Force
Filing Date 2022-07-25
First Publication Date 2022-11-10
Grant Date 2023-07-18
Owner OneTrust, LLC (USA)
Inventor
  • Brannon, Jonathan Blake
  • Whitney, Patrick
  • Chavva, Sharath Chandra

Abstract

Various aspects involve forgoing updates to consent data for at least one consent rejection generated by an automated consent rejection tool. For instance, a consent management system can be communicatively coupled to a user device. The user device can detect invocations of a consent rejection function, such as when browser states of a browser application indicate requests for web pages or other online content. The consent management system can document a consent rejection for one or more of the invocations. The consent management system can also prevent documentation of consent being rejected for at least one invocation initiated by an automated consent rejection tool.

IPC Classes  ?

  • G06F 3/0483 - Interaction with page-structured environments, e.g. book metaphor
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 9/54 - Interprogram communication

68.

TRUST INTELLIGENCE

      
Serial Number 97663690
Status Pending
Filing Date 2022-11-04
Owner OneTrust LLC ()
NICE Classes  ? 45 - Legal and security services; personal services for individuals.

Goods & Services

advisory services relating to regulatory compliance matters in the fields of data privacy, data security and mapping, data governance, risk, ethics, privacy impact assessments, and the creation and documentation of data protection officer roles; advice and consultancy on environmental regulatory matters regarding environmental sustainability, carbon accounting, and environmental, social, and transparent, ethical and diverse corporate governance (ESG); legal advisory services in the fields of data privacy, data security, data governance, risk, ethics, environmental sustainability, carbon accounting, and environmental, social and transparent, ethical and diverse governance (ESG); provision of legal information in the fields of data privacy, data security, data governance, risk, ethics, environmental sustainability, carbon accounting, and environmental, social and transparent, ethical and diverse governance (ESG)

69.

PARTNER FOR TRUST TRANSFORMATION

      
Serial Number 97663698
Status Pending
Filing Date 2022-11-04
Owner OneTrust LLC ()
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 42 - Scientific, technological and industrial services, research and design
  • 45 - Legal and security services; personal services for individuals.

Goods & Services

Downloadable software for monitoring, tracking and auditing compliance with, and providing training in laws, regulations, and standards and internal policies in the fields of data privacy, data security, data collection, data governance, risk, ethics, environmental sustainability and responsibility, carbon accounting, reduction and offsetting, and environmental, social, and corporate governance (ESG) and ESG program management; downloadable software featuring software for managing vulnerabilities, threat modeling, assessing, auditing, managing, monitoring, framework mapping, data protection impact assessments, optimizing privacy compliance workflows and mitigating cybersecurity risk and for ensuring compliance with applicable privacy and security risk management standards and regulations Software as a service (SAAS) services featuring software to monitor, track and audit compliance with, and provide training in laws, regulations, and standards, and internal policies in the fields of data privacy, data security, data collection, data governance, risk, ethics, environmental sustainability and responsibility, carbon accounting, reduction and offsetting, and environmental, social, and corporate governance (ESG) and ESG program management; software as a service (SAAS) services featuring software for data collection and to implement controls, assessments, training, incident reporting and disclosures, and policies, and to monitor, report, and communicate practices to others, all in the fields of data privacy, data security, data governance, risk, ethics, environmental sustainability and responsibility, carbon accounting, reduction and offsetting, and environmental, social and governance (ESG); data security and privacy consultancy, namely, providing cyber risk and privacy services in the nature of assessing security and privacy controls and procedures in place to identify and control access to data; assessing the processes and procedures in place to evaluate the cyber and privacy capabilities related to systems, people, assets, data, and capabilities; providing cybersecurity advisory services in the nature of system and data security consultancy related to identification, assessment, remediation of controls, processes, policies, and infrastructure; software as a service (SAAS) services featuring software for managing vulnerabilities, threat modeling, assessing, auditing, managing, monitoring, framework mapping, data protection impact assessments, optimizing privacy compliance workflows and mitigating cybersecurity risk and for ensuring compliance with applicable privacy and security risk management standards and regulations advisory services relating to regulatory compliance matters in the fields of data privacy, data security and mapping, data governance, risk, ethics, privacy impact assessments, and the creation and documentation of data protection officer roles;advice and consultancy on environmental regulatory matters regarding environmental sustainability, carbon accounting, and environmental, social, and environmental, social and governance corporate governance (ESG); legal advisory services in the fields of data privacy, data security, data governance, risk, ethics, environmental sustainability, carbon accounting, and environmental, social and governance (ESG); provision of legal information in the fields of data privacy, data security, data governance, risk, ethics, environmental sustainability, carbon accounting, and environmental, social and governance (ESG)

70.

TRUST INTELLIGENCE PLATFORM

      
Serial Number 97663648
Status Pending
Filing Date 2022-11-04
Owner OneTrust LLC ()
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

Downloadable software for monitoring, tracking and auditing compliance with, and providing training in laws, regulations, and standards and internal policies in the fields of data privacy, data security, data collection, data governance, risk, ethics, environmental sustainability and responsibility, carbon accounting, reduction and offsetting, and environmental, social, and transparent, ethical and diverse governance (ESG) and ESG program management; downloadable software featuring software for managing vulnerabilities, threat modeling, assessing, auditing, managing, monitoring, framework mapping, data protection impact assessments, optimizing privacy compliance workflows and mitigating cybersecurity risk and for ensuring compliance with applicable privacy and security risk management standards and regulations Software as a service (SAAS) services featuring software to monitor, track and audit compliance with, and provide training in laws, regulations, and standards, and internal policies in the fields of data privacy, data security, data collection, data governance, risk, ethics, environmental sustainability and responsibility, carbon accounting, reduction and offsetting, and environmental, social, transparent, ethical and diverse governance (ESG), and ESG program management; software as a service (SAAS) services featuring software for data collection and to implement controls, assessments, training, incident reporting and disclosures, and policies, and to monitor, report, and communicate practices to others, all in the fields of data privacy, data security, data governance, risk, ethics, environmental sustainability and responsibility, carbon accounting, reduction and offsetting, and environmental, social and governance (ESG); data security and privacy consultancy, namely, providing cyber risk and privacy services in the nature of assessing security and privacy controls and procedures in place to identify and control access to data; assessing the processes and procedures in place to evaluate the cyber and privacy capabilities related to systems, people, assets, data, and capabilities; providing cybersecurity advisory services in the nature of system and data security consultancy related to identification, assessment, remediation of controls, processes, policies, and infrastructure; software as a service (SAAS) services featuring software for managing vulnerabilities, threat modeling, assessing, auditing, managing, monitoring, framework mapping, data protection impact assessments, optimizing privacy compliance workflows and mitigating cybersecurity risk and for ensuring compliance with applicable privacy and security risk management standards and regulations

71.

BUILD TRUST. DEMONSTRATE IMPACT.

      
Serial Number 97663711
Status Pending
Filing Date 2022-11-04
Owner OneTrust LLC ()
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 42 - Scientific, technological and industrial services, research and design
  • 45 - Legal and security services; personal services for individuals.

Goods & Services

Downloadable software for monitoring, tracking and auditing compliance with, and providing training in laws, regulations, and standards and internal policies in the fields of data privacy, data security, data collection, data governance, risk, ethics, environmental sustainability and responsibility, carbon accounting, reduction and offsetting, and environmental, social, and corporate governance (ESG) and ESG program management; downloadable software featuring software for managing vulnerabilities, threat modeling, assessing, auditing, managing, monitoring, framework mapping, data protection impact assessments, optimizing privacy compliance workflows and mitigating cybersecurity risk and for ensuring compliance with applicable privacy and security risk management standards and regulations Software as a service (SAAS) services featuring software to monitor, track and audit compliance with, and provide training in laws, regulations, and standards, and internal policies in the fields of data privacy, data security, data collection, data governance, risk, ethics, environmental sustainability and responsibility, carbon accounting, reduction and offsetting, and environmental, social, and corporate governance (ESG) and ESG program management; software as a service (SAAS) services featuring software for data collection and to implement controls, assessments, training, incident reporting and disclosures, and policies, and to monitor, report, and communicate practices to others, all in the fields of data privacy, data security, data governance, risk, ethics, environmental sustainability and responsibility, carbon accounting, reduction and offsetting, and environmental, social and governance (ESG); data security and privacy consultancy, namely, providing cyber risk and privacy services in the nature of assessing security and privacy controls and procedures in place to identify and control access to data; assessing the processes and procedures in place to evaluate the cyber and privacy capabilities related to systems, people, assets, data, and capabilities; providing cybersecurity advisory services in the nature of system and data security consultancy related to identification, assessment, remediation of controls, processes, policies, and infrastructure; software as a service (SAAS) services featuring software for managing vulnerabilities, threat modeling, assessing, auditing, managing, monitoring, framework mapping, data protection impact assessments, optimizing privacy compliance workflows and mitigating cybersecurity risk and for ensuring compliance with applicable privacy and security risk management standards and regulations Advisory consulting services relating to regulatory compliance matters in the fields of data privacy, data security and mapping, data governance, risk, ethics, privacy impact assessments, and the creation and documentation of data protection officer roles; Advice and consultancy on environmental regulatory matters regarding environmental sustainability, carbon accounting, and environmental, social, and environmental, social and governance corporate governance (ESG); legal advisory services in the fields of data privacy, data security, data governance, risk, ethics, environmental sustainability, carbon accounting, and environmental, social and governance ESG; provision of legal information in the fields of data privacy, data security, data governance, risk, ethics, environmental sustainability, carbon accounting, and environmental, social and governance (ESG)

72.

Data processing systems for identifying whether cookies contain personally identifying information

      
Application Number 17850244
Grant Number 11663359
Status In Force
Filing Date 2022-06-27
First Publication Date 2022-11-03
Grant Date 2023-05-30
Owner OneTrust, LLC (USA)
Inventor
  • Beaumont, Richard
  • Mannix, John
  • Barday, Kabir A.
  • Brannon, Jonathan Blake

Abstract

A system for identifying and determining whether a particular cookie may include personal data, in any embodiment described herein, is configured to analyze collected cookies to determine whether the collected cookies may be used to directly or indirectly identify a particular individual. The system may, for example: (1) generate one or more virtual profiles; (2) use the one or more virtual profiles to access a plurality of websites; (3) collect cookie data for the plurality of websites for the one or more virtual profiles; and (4) analyze the cookie data to determine whether a particular website of the plurality of websites utilizes one or more cookies which may potentially include personal data. The system may then generate a report of the analysis, and display the report to an administrator or other individual associated with the particular website.

IPC Classes  ?

  • H04L 29/00 - Arrangements, apparatus, circuits or systems, not covered by a single one of groups
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • H04L 9/40 - Network security protocols
  • H04L 67/02 - Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]

73.

Data processing consent capture systems and related methods

      
Application Number 17860255
Grant Number 11645353
Status In Force
Filing Date 2022-07-08
First Publication Date 2022-11-03
Grant Date 2023-05-09
Owner OneTrust, LLC (USA)
Inventor
  • Brannon, Jonathan Blake
  • Whitney, Patrick

Abstract

In various embodiments, a data processing consent capture system may be configured to prompt the data subject to consent to one or more types of data processing (e.g., to provide a desired consent) in response to identifying particular cookies (e.g., or types of data processing) that a data subject has not consented to. The system may, for example, substantially automatically prompt the data subject to consent for one or more particular types of data processing in response to determining that the user (e.g., data subject) has requested that a website or other system perform one or more functions that are not possible without a particular type of consent from the data subject. The system may, for example, prompt the user to consent in time for a certain interaction with the website, application, etc.

IPC Classes  ?

  • G06F 9/44 - Arrangements for executing specific programs
  • G06F 16/958 - Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
  • G06F 16/957 - Browsing optimisation, e.g. caching or content distillation
  • G06F 16/951 - Indexing; Web crawling techniques
  • G06F 40/174 - Form filling; Merging

74.

Data processing systems for verification of consent and notice processing and related methods

      
Application Number 17867068
Grant Number 11556672
Status In Force
Filing Date 2022-07-18
First Publication Date 2022-11-03
Grant Date 2023-01-17
Owner OneTrust, LLC (USA)
Inventor
  • Brannon, Jonathan Blake
  • Hill, Casey

Abstract

A system and method for determining consent user interface validity for a provided consent user interface of a web form presenting consent information, comprising: accessing a consent user interface presented on a web form; determining one or more configuration attributes of the consent user interface; accessing one or more privacy regulations associated with presenting consent information; comparing the one or more configuration attributes of the consent user interface to each of the one or more privacy regulations; determining whether the consent user interface is compliant with each of the one or more privacy regulations; and in response to determining that the consent user interface is not compliant with one or more privacy regulations, flagging the consent user interface.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 16/958 - Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
  • G06F 21/60 - Protecting data

75.

Assessing and managing computational risk involved with integrating third party computing functionality within a computing system

      
Application Number 17722551
Grant Number 11562078
Status In Force
Filing Date 2022-04-18
First Publication Date 2022-10-20
Grant Date 2023-01-24
Owner OneTrust, LLC (USA)
Inventor
  • Sabourin, Jason L.
  • Patel, Shiven

Abstract

In general, various aspects of the present disclosure provide methods, apparatuses, systems, computing devices, computing entities, and/or the like for addressing a modified risk rating identifying a risk to an entity of having computer-implemented functionality provided by a vendor integrated with a computing system of the entity. In accordance various aspects, a method is provided that comprises: receiving a first assessment dataset for computer-implemented functionality; detecting an inconsistency between a value of an attribute for the computer-implemented functionality specified in the first assessment dataset and a corresponding value of the attribute specified in a second assessment dataset for the computer-implemented functionality; modifying a risk rating that identifies a risk to the entity of having the computer-implemented functionality integrated with the computing system to generate a modified risk rating based on the inconsistency; and in response, performing an action with respect to the computing system to address the modified risk rating.

IPC Classes  ?

  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 9/54 - Interprogram communication
  • G06Q 10/06 - Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling

76.

Data processing systems and communication systems and methods for the efficient generation of risk assessments

      
Application Number 17836430
Grant Number 11651402
Status In Force
Filing Date 2022-06-09
First Publication Date 2022-10-06
Grant Date 2023-05-16
Owner OneTrust, LLC (USA)
Inventor Barday, Kabir A.

Abstract

Computer implemented methods, according to various embodiments, comprise: (1) integrating a privacy management system with DLP tools; (2) using the DLP tools to identify sensitive information that is stored in computer memory outside of the context of the privacy management system; and (3) in response to the sensitive data being discovered by the DLP tool, displaying each area of sensitive data to a privacy officer (e.g., similar to pending transactions in a checking account that have not been reconciled). A designated privacy officer may then select a particular entry and either match it up (e.g., reconcile it) with an existing data flow or campaign in the privacy management system, or trigger a new privacy assessment to be done on the data to capture the related privacy attributes and data flow information.

IPC Classes  ?

  • G06Q 30/06 - Buying, selling or leasing transactions
  • G06Q 30/0601 - Electronic shopping [e-shopping]
  • G06Q 10/0631 - Resource planning, allocation, distributing or scheduling for enterprises or organisations
  • G06Q 50/26 - Government or public services
  • G06Q 10/0635 - Risk analysis of enterprise or organisation activities

77.

DATA PROCESSING SYSTEMS FOR FULFILLING DATA SUBJECT ACCESS REQUESTS AND RELATED METHODS

      
Application Number 17837393
Status Pending
Filing Date 2022-06-10
First Publication Date 2022-10-06
Owner OneTrust, LLC (USA)
Inventor
  • Barday, Kabir A.
  • Sabourin, Jason L.
  • Brannon, Jonathan Blake
  • Karanjkar, Mihir S.
  • Jones, Kevin

Abstract

A Data Subject Access Request (DSAR) Prioritization System, according to various embodiments, is adapted for (1) executing the steps of receiving a data subject access request (DSAR); (2) at least partially in response to receiving the DSAR, obtaining metadata associated with at least one of the DSAR or a data subject associated with the DSAR; (3) using the metadata to determine whether a priority of the DSAR should be adjusted based at least in part on the obtained metadata; and (4) in response to determining that the priority of the DSAR should be adjusted based at least in part on the obtained metadata, adjusting the priority of the DSAR.

IPC Classes  ?

78.

DATA PROCESSING AND COMMUNICATIONS SYSTEMS AND METHODS FOR THE EFFICIENT IMPLEMENTATION OF PRIVACY BY DESIGN

      
Application Number 17838879
Status Pending
Filing Date 2022-06-13
First Publication Date 2022-09-29
Owner OneTrust, LLC (USA)
Inventor Barday, Kabir A.

Abstract

Computer-readable media, according to various embodiments, store computer-executable instructions for: (1) analyzing computer code for a mobile application to identify a tracking technology being used by the mobile application for collecting personal data of a user of the mobile application; (1) identifying a recommendation for managing a design of the mobile application in light of the tracking technology; (3) identifying a task to implement the recommendation; (4) generating output comprising a report documenting the task; and (5) providing the report for display to an individual on a display screen.

IPC Classes  ?

  • G06Q 10/06 - Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
  • G06F 15/76 - Architectures of general purpose stored program computers
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities

79.

Systems and methods for identifying data processing activities based on data discovery results

      
Application Number 17828953
Grant Number 11615192
Status In Force
Filing Date 2022-05-31
First Publication Date 2022-09-22
Grant Date 2023-03-28
Owner OneTrust, LLC (USA)
Inventor
  • Brannon, Jonathan Blake
  • Jones, Kevin
  • Pitchaimani, Saravanan
  • Patton-Kuhl, Dylan D.
  • Malladi, Ramana
  • Viswanathan, Subramanian

Abstract

Aspects of the present invention provide methods, apparatuses, systems, computing devices, computing entities, and/or the like for identifying data processing activities associated with various data assets based on data discovery results. In accordance various aspects, a method is provided comprising: identifying and scanning data assets to detect a subset of the data assets, wherein each asset of the subset is associated with a particular data element used for target data; generating a prediction for each pair of data assets of the subset on the target data flowing between the pair; identifying a data flow for the target data based on the prediction generated for each pair; and identifying a data processing activity associated with handling the target data based on a correlation identified for the particular data element, the subset, and/or the data flow with a known data element, subset, and/or data flow for the data processing activity.

IPC Classes  ?

  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06N 20/00 - Machine learning
  • G06V 30/24 - Character recognition characterised by the processing or recognition method
  • G06F 21/60 - Protecting data

80.

Data processing systems for data testing to confirm data deletion and related methods

      
Application Number 17831700
Grant Number 11645418
Status In Force
Filing Date 2022-06-03
First Publication Date 2022-09-22
Grant Date 2023-05-09
Owner OneTrust, LLC (USA)
Inventor
  • Brannon, Jonathan Blake
  • Jones, Kevin
  • Patton-Kuhl, Dylan D.
  • Kveen, Bryan Patrick
  • Pavlichek, Nicholas Ian
  • Crawford, Eliza Rose

Abstract

In particular embodiments, a Personal Data Deletion System is configured to: (1) at least partially automatically identify and delete personal data that an entity is required to erase under one or more of the conditions discussed above; and (2) perform one or more data tests after the deletion to confirm that the system has, in fact, deleted any personal data associated with the data subject. The system may, for example, be configured to test to ensure the data has been deleted by: (1) submitting a unique token of data through a form to a system; (2) in response to passage of an expected data retention time, test the system by calling into the system after the passage of the data retention time to search for the unique token.

IPC Classes  ?

  • G06F 9/44 - Arrangements for executing specific programs
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 16/9038 - Presentation of query results
  • G06F 15/76 - Architectures of general purpose stored program computers
  • G06F 21/31 - User authentication
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • H04L 9/40 - Network security protocols

81.

Data processing systems for verification of consent and notice processing and related methods

      
Application Number 17832313
Grant Number 11544405
Status In Force
Filing Date 2022-06-03
First Publication Date 2022-09-22
Grant Date 2023-01-03
Owner OneTrust, LLC (USA)
Inventor
  • Brannon, Jonathan Blake
  • Beaumont, Richard A.

Abstract

A method for managing a consent receipt under an electronic transaction, comprising: receiving a request to initiate a transaction between the entity and the data subject; providing a privacy policy associated with the entity and based at least in part on the request to initiate the transaction between the entity and the data subject; accessing the privacy policy associated with the entity; storing one or more provisions of the privacy policy associated with the entity; providing a user interface for consenting to the privacy policy associated with the entity; receiving a selection to consent to the privacy policy associated with the entity and based at least in part on the request to initiate the transaction between the entity and the data subject; generating, by a third-party consent receipt management system, a consent receipt to the data subject; and storing the generated consent receipt.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 16/23 - Updating
  • G06F 9/451 - Execution arrangements for user interfaces
  • G06F 3/0485 - Scrolling or panning
  • G06F 3/0482 - Interaction with lists of selectable items, e.g. menus

82.

DATA TRANSFER DISCOVERY AND ANALYSIS SYSTEMS AND RELATED METHODS

      
Application Number US2022019358
Publication Number 2022/192269
Status In Force
Filing Date 2022-03-08
Publication Date 2022-09-15
Owner ONETRUST, LLC (USA)
Inventor
  • Brannon, Jonathan Blake
  • Jones, Kevin

Abstract

In various aspects, a data transfer discovery and analysis system may query an entity computing system to identify access credentials for third-party computing systems and scan each access credential to determine associated permissions provided by each access credential on the entity computing system. The data transfer discovery and analysis system may further inspect access logs to identify actual data transfers between the entity computing system and third-party computing systems as well as other access activity associated with each of the credentials. The system can generate and store a mapping of all actual data transfers (e.g., based on the access log data) and potential data transfers (e.g., based on particular access permissions) between/among the entity computing system and the third-party computing systems. By analyzing access logs to determine actual data transfers executed under each particular access credential, the data transfer discovery and analysis system can identify unused and/or underutilized access permissions.

IPC Classes  ?

  • G06F 21/60 - Protecting data
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • H04L 9/40 - Network security protocols
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

83.

DATA PROCESSING SYSTEMS AND METHODS FOR SYNCHING PRIVACY-RELATED USER CONSENT ACROSS MULTIPLE COMPUTING DEVICES

      
Application Number US2022019882
Publication Number 2022/192627
Status In Force
Filing Date 2022-03-11
Publication Date 2022-09-15
Owner ONETRUST, LLC (USA)
Inventor
  • Brannon, Jonathan Blake
  • Whitney, Patrick
  • Cash, Alex
  • Wyckoff, Spencer
  • Hanson, Stephanie
  • Doshi, Pratik

Abstract

A privacy-related consent extension and data processing system may be configured to automatically extend one or more privacy-related consents for a user of a first computing device to a second computing device. In various embodiments, the system is configured to provide a computer-readable indicium(indicia) on a previously unknown computing device upon initiation of a transaction between a user and an entity collecting and processing privacy data. In response to a user using a known computing device to scan the computer-readable indicium, in various embodiments, the system may provide the ability to share user consent data provided by the first known device to the second unknown device, allowing the user to provide consent without manually re-entering privacy and consent preferences.

IPC Classes  ?

  • G06F 21/60 - Protecting data
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 21/36 - User authentication by graphic or iconic representation

84.

DATA PROCESSING SYSTEMS AND METHODS FOR PERFORMING ASSESSMENTS AND MONITORING OF NEW VERSIONS OF COMPUTER CODE FOR COMPLIANCE

      
Application Number 17749732
Status Pending
Filing Date 2022-05-20
First Publication Date 2022-09-08
Owner OneTrust, LLC (USA)
Inventor
  • Barday, Kabir A.
  • Karanjkar, Mihir S.
  • Finch, Steven W.
  • Browne, Ken A.
  • Heard, Nathan W.
  • Patel, Aakash H.
  • Sabourin, Jason L.
  • Daniel, Richard L.
  • Patton-Kuhl, Dylan D.
  • Brannon, Jonathan Blake

Abstract

In various embodiments, a data map generation system is configured to receive a request to generate a privacy-related data map for particular computer code, and, at least partially in response to the request, determine a location of the particular computer code, automatically obtain the particular computer code based on the determined location, and analyze the particular computer code to determine privacy-related attributes of the particular computer code, where the privacy-related attributes indicate types of personal information that the particular computer code collects or accesses. The system may be further configured to generate and display a data map of the privacy-related attributes to a user.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06Q 10/06 - Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling

85.

Data transfer discovery and analysis systems and related methods

      
Application Number 17689683
Grant Number 11533315
Status In Force
Filing Date 2022-03-08
First Publication Date 2022-09-08
Grant Date 2022-12-20
Owner OneTrust, LLC (USA)
Inventor
  • Brannon, Jonathan Blake
  • Jones, Kevin

Abstract

In various aspects, a data transfer discovery and analysis system may query an entity computing system to identify access credentials for third-party computing systems and scan each access credential to determine associated permissions provided by each access credential on the entity computing system. The data transfer discovery and analysis system may further inspect access logs to identify actual data transfers between the entity computing system and third-party computing systems as well as other access activity associated with each of the credentials. The system can generate and store a mapping of all actual data transfers (e.g., based on the access log data) and potential data transfers (e.g., based on particular access permissions) between/among the entity computing system and the third-party computing systems. By analyzing access logs to determine actual data transfers executed under each particular access credential, the data transfer discovery and analysis system can identify unused and/or underutilized access permissions.

IPC Classes  ?

86.

DATA SUBJECT ACCESS REQUEST PROCESSING SYSTEMS AND RELATED METHODS

      
Application Number 17745829
Status Pending
Filing Date 2022-05-16
First Publication Date 2022-09-01
Owner OneTrust, LLC (USA)
Inventor
  • Brannon, Jonathan Blake
  • Hill, Casey

Abstract

In particular embodiments, computer-implemented data processing, systems, and method configured to: receive a request to initiate a transaction between an entity and a data subject, generate (i) a consent receipt for the transaction comprising at least a unique subject identifier and a unique consent receipt key and (ii) a unique cookie to identify the data subject's transaction initiated by the data subject, store the consent receipt for the transaction and the unique cookie, receive a data subject access request from the data subject, verify an identity of the data subject based at least in part on the unique cookie process the request, process the request by identifying one or more pieces of personal data associated with the data subject, and taking one or more actions based at least in part on the data subject access request.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules

87.

APPLICATION PRIVACY SCANNING SYSTEMS AND RELATED METHODS

      
Application Number 17743749
Status Pending
Filing Date 2022-05-13
First Publication Date 2022-08-25
Owner OneTrust, LLC (USA)
Inventor
  • Jones, Kevin
  • Deweese, William
  • Devenish, Justin
  • Pitchaimani, Saravanan
  • Brannon, Jonathan Blake

Abstract

An application privacy analysis system is described, where the system obtains an application and analyzes it for privacy related data use. The system may determine privacy related activities of the application from established sources of such data and/or may decompile the application and analyze the resulting code to determine the privacy related activities of the application. The system may execute the application and monitor the communications traffic exchanged by the application to determine privacy related activities of the application. The system may store the results of such analyses for future reference.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 16/955 - Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
  • G06F 16/904 - Browsing; Visualisation therefor
  • G06F 16/901 - Indexing; Data structures therefor; Storage structures

88.

MANAGING CUSTOM WORKFLOWS FOR DOMAIN OBJECTS DEFINED WITHIN MICROSERVICES

      
Application Number US2022016735
Publication Number 2022/178089
Status In Force
Filing Date 2022-02-17
Publication Date 2022-08-25
Owner ONETRUST, LLC (USA)
Inventor
  • Viswanathan, Subramanian
  • Shah, Milap

Abstract

In general, various aspects of the present invention provide methods, apparatuses, systems, computing devices, computing entities, and/or the like for generating and managing custom workflows for domain objects defined within microservices. In accordance with various aspects, a method is that comprises: receiving an attribute value for a custom workflow to include in a microservice that corresponds to an attribute defined for a workflow component; accessing mapping data for an attribute; identifying, based on the mapping data, a corresponding field of a workflows table mapped to the attribute; storing a record in the workflows table for the custom workflow with the attribute value stored in the corresponding field for the record to persist the custom workflow in the microservice.

IPC Classes  ?

  • G06Q 10/06 - Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
  • G06Q 10/10 - Office automation; Time management

89.

SELECTIVE REDACTION OF MEDIA CONTENT

      
Application Number US2022016930
Publication Number 2022/178219
Status In Force
Filing Date 2022-02-18
Publication Date 2022-08-25
Owner ONETRUST, LLC (USA)
Inventor Brannon, Jonathan Blake

Abstract

In general, various aspects of the present invention provide methods, apparatuses, systems, computing devices, computing entities, and/or the like for identifying and documenting certain subject matter found in media content, as well as selectively redacting the subject matter found in media content. In accordance with various aspects, a method is provided that comprises: obtaining first metadata for media content, the metadata identifying a context and a portion of content for an individual; identifying, based on the context, a certain subject matter for the media content; determining that a particular item associated with the subject matter is present in the portion of content associated with the individual; generating second metadata to document the particular item present in the portion of content; and using the second metadata to selectively redacting the item from the portion of content associated with the individual upon request to do so with respect to the individual.

IPC Classes  ?

  • G10L 15/26 - Speech to text systems
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06V 10/00 - Arrangements for image or video recognition or understanding

90.

Managing custom workflows for domain objects defined within microservices

      
Application Number 17674187
Grant Number 11775348
Status In Force
Filing Date 2022-02-17
First Publication Date 2022-08-18
Grant Date 2023-10-03
Owner OneTrust, LLC (USA)
Inventor
  • Viswanathan, Subramanian
  • Shah, Milap

Abstract

In general, various aspects of the present invention provide methods, apparatuses, systems, computing devices, computing entities, and/or the like for generating and managing custom workflows for domain objects defined within microservices. In accordance with various aspects, a method is that comprises: receiving an attribute value for a custom workflow to include in a microservice that corresponds to an attribute defined for a workflow component; accessing mapping data for an attribute; identifying, based on the mapping data, a corresponding field of a workflows table mapped to the attribute; storing a record in the workflows table for the custom workflow with the attribute value stored in the corresponding field for the record to persist the custom workflow in the microservice.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

91.

SYSTEMS AND METHODS FOR MITIGATING RISKS OF THIRD-PARTY COMPUTING SYSTEM FUNCTIONALITY INTEGRATION INTO A FIRST-PARTY COMPUTING SYSTEM

      
Application Number US2022015929
Publication Number 2022/173912
Status In Force
Filing Date 2022-02-10
Publication Date 2022-08-18
Owner ONETRUST, LLC (USA)
Inventor
  • Viswanathan, Subramanian
  • Shah, Milap

Abstract

In general, various aspects of the present invention provide methods, apparatuses, systems, computing devices, computing entities, and/or the like for integrating third party computing system functionality into a first party computing system by providing a risk management and mitigation computing system configured to analyze a risk of integrating the functionality provided by the third party computing system and facilitating implementation of one or more data-related controls that include performing computer-specific operations to mitigate and/or eliminate the identified risks. For example, the risk management and mitigation computing system can access risk data in tenant computing systems to determine a risk score related to the integration of the third party computing system functionality based on risks determined during prior integrations of the third party computing system functionality by other tenant computing systems. The risk management and mitigation computing system can generate a recommended control when integrating the third party computing system functionality.

IPC Classes  ?

92.

DATA PROCESSING SYSTEMS FOR ASSESSING READINESS FOR RESPONDING TO PRIVACY-RELATED INCIDENTS

      
Application Number 17739364
Status Pending
Filing Date 2022-05-09
First Publication Date 2022-08-18
Owner OneTrust, LLC (USA)
Inventor
  • Hecht, Trey
  • Clearwater, Andrew
  • Brannon, Jonathan Blake
  • Thielová, Linda

Abstract

Data processing systems and methods, according to various embodiments, are adapted for mapping various questions regarding a data breach from a master questionnaire to a plurality of territory-specific data breach disclosure questionnaires. The answers to the questions in the master questionnaire are used to populate the territory-specific data breach disclosure questionnaires and determine whether disclosure is required in territory. The system can automatically notify the appropriate regulatory bodies for each territory where it is determined that data breach disclosure is required.

IPC Classes  ?

  • G06Q 10/06 - Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 15/76 - Architectures of general purpose stored program computers
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities

93.

Selective redaction of media content

      
Application Number 17675118
Grant Number 11546661
Status In Force
Filing Date 2022-02-18
First Publication Date 2022-08-18
Grant Date 2023-01-03
Owner OneTrust, LLC (USA)
Inventor Brannon, Jonathan Blake

Abstract

In general, various aspects of the present invention provide methods, apparatuses, systems, computing devices, computing entities, and/or the like for identifying and documenting certain subject matter found in media content, as well as selectively redacting the subject matter found in media content. In accordance with various aspects, a method is provided that comprises: obtaining first metadata for media content, the metadata identifying a context and a portion of content for an individual; identifying, based on the context, a certain subject matter for the media content; determining that a particular item associated with the subject matter is present in the portion of content associated with the individual; generating second metadata to document the particular item present in the portion of content; and using the second metadata to selectively redacting the item from the portion of content associated with the individual upon request to do so with respect to the individual.

IPC Classes  ?

  • H04N 21/454 - Content filtering, e.g. blocking advertisements
  • H04N 21/235 - Processing of additional data, e.g. scrambling of additional data or processing content descriptors
  • H04N 21/845 - Structuring of content, e.g. decomposing content into time segments

94.

Systems and methods for mitigating risks of third-party computing system functionality integration into a first-party computing system

      
Application Number 17668714
Grant Number 11601464
Status In Force
Filing Date 2022-02-10
First Publication Date 2022-08-11
Grant Date 2023-03-07
Owner OneTrust, LLC (USA)
Inventor
  • Viswanathan, Subramanian
  • Shah, Milap

Abstract

In general, various aspects of the present invention provide methods, apparatuses, systems, computing devices, computing entities, and/or the like for integrating third party computing system functionality into a first party computing system by providing a risk management and mitigation computing system configured to analyze a risk of integrating the functionality provided by the third party computing system and facilitating implementation of one or more data-related controls that include performing computer-specific operations to mitigate and/or eliminate the identified risks. For example, the risk management and mitigation computing system can access risk data in tenant computing systems to determine a risk score related to the integration of the third party computing system functionality based on risks determined during prior integrations of the third party computing system functionality by other tenant computing systems. The risk management and mitigation computing system can generate a recommended control when integrating the third party computing system functionality.

IPC Classes  ?

95.

MANAGING CUSTOM ATTRIBUTES FOR DOMAIN OBJECTS DEFINED WITHIN MICROSERVICES

      
Application Number US2022015241
Publication Number 2022/170047
Status In Force
Filing Date 2022-02-04
Publication Date 2022-08-11
Owner ONETRUST, LLC (USA)
Inventor
  • Viswanathan, Subramanian
  • Shah, Milap

Abstract

In general, various aspects of the present invention provide methods, apparatuses, systems, computing devices, computing entities, and/or the like for generating and managing custom attributes and corresponding values for domain objects defined within microservices. In accordance with various aspects, a method is provided that comprises: receiving a custom attribute request for a domain object defined in a microservice that comprises a domain object identifier, a custom attribute to add to the domain object, and a value type for the custom attribute; identifying, based on the domain object identifier and the value type, a custom value table for the domain object that comprises placeholder fields; identifying a placeholder field that is available in the custom value table; and storing a record in the attribute schema table for the domain object and the custom attribute comprising mapping data that maps the custom attribute to the placeholder field for the custom value table.

IPC Classes  ?

  • G06F 9/448 - Execution paradigms, e.g. implementations of programming paradigms
  • G06F 16/28 - Databases characterised by their database models, e.g. relational or object models
  • G06Q 10/06 - Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling

96.

DATA PROCESSING SYSTEMS AND METHODS FOR ANONYMIZING DATA SAMPLES IN CLASSIFICATION ANALYSIS

      
Application Number US2022015637
Publication Number 2022/170254
Status In Force
Filing Date 2022-02-08
Publication Date 2022-08-11
Owner ONETRUST, LLC (USA)
Inventor
  • Jones, Kevin
  • Pitchaimani, Saravanan

Abstract

In general, various aspects of the present invention provide methods, apparatuses, systems, computing devices, computing entities, and/or the like for mapping the existence of target data within computing systems in a manner that does not expose the target data to potential data-related incidents. In accordance with various aspects, a method is provided that comprises: receiving a source dataset that comprises a label assigned to a data element used by a data source in handling target data that identifies a type of target data and data samples gathered for the data element; determining, based on the label, that the data samples are to be anonymized; generating supplemental anonymizing data samples associated with the label that comprise fictitious occurrences of the type of the target data; generating a review dataset comprising the supplemental anonymizing data samples intermingled with the data samples; and sending the review dataset to a review computing system.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

97.

Data processing systems and methods for anonymizing data samples in classification analysis

      
Application Number 17666886
Grant Number 11494515
Status In Force
Filing Date 2022-02-08
First Publication Date 2022-08-11
Grant Date 2022-11-08
Owner OneTrust, LLC (USA)
Inventor
  • Jones, Kevin
  • Pitchaimani, Saravanan

Abstract

In general, various aspects of the present invention provide methods, apparatuses, systems, computing devices, computing entities, and/or the like for mapping the existence of target data within computing systems in a manner that does not expose the target data to potential data-related incidents. In accordance with various aspects, a method is provided that comprises: receiving a source dataset that comprises a label assigned to a data element used by a data source in handling target data that identifies a type of target data and data samples gathered for the data element; determining, based on the label, that the data samples are to be anonymized; generating supplemental anonymizing data samples associated with the label that comprise fictitious occurrences of the type of the target data; generating a review dataset comprising the supplemental anonymizing data samples intermingled with the data samples; and sending the review dataset to a review computing system.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 16/28 - Databases characterised by their database models, e.g. relational or object models

98.

DATA PROCESSING SYSTEMS AND METHODS FOR CUSTOMIZING PRIVACY TRAINING

      
Application Number 17717721
Status Pending
Filing Date 2022-04-11
First Publication Date 2022-08-04
Owner OneTrust, LLC (USA)
Inventor
  • Clearwater, Andrew
  • Barday, Kabir A.
  • Brannon, Jonathan Blake
  • Walk, Hannah Rose

Abstract

Data processing systems and methods, according to various embodiments, are adapted for performing a process of procuring a vendor and sub-processes associated therewith, such as performing vendor risk assessments and providing training specific to the procurement of that particular vendor. Training requirements for the user procuring the vendor and/or for the vendor itself are determined and any deficiencies in current, valid training requirements are identified. Training to address any identified deficiencies is provided as part of the vendor procurement process. Training may be customized based on trainee and/or organization attributes to improve the effectiveness of such training.

IPC Classes  ?

  • G06Q 10/06 - Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 15/76 - Architectures of general purpose stored program computers

99.

Managing custom attributes for domain objects defined within microservices

      
Application Number 17592922
Grant Number 11442906
Status In Force
Filing Date 2022-02-04
First Publication Date 2022-08-04
Grant Date 2022-09-13
Owner OneTrust, LLC (USA)
Inventor
  • Viswanathan, Subramanian
  • Shah, Milap

Abstract

In general, various aspects of the present invention provide methods, apparatuses, systems, computing devices, computing entities, and/or the like for generating and managing custom attributes and corresponding values for domain objects defined within microservices. In accordance with various aspects, a method is provided that comprises: receiving a custom attribute request for a domain object defined in a microservice that comprises a domain object identifier, a custom attribute to add to the domain object, and a value type for the custom attribute; identifying, based on the domain object identifier and the value type, a custom value table for the domain object that comprises placeholder fields; identifying a placeholder field that is available in the custom value table; and storing a record in the attribute schema table for the domain object and the custom attribute comprising mapping data that maps the custom attribute to the placeholder field for the custom value table.

IPC Classes  ?

100.

CONSENT RECEIPT MANAGEMENT SYSTEMS AND RELATED METHODS

      
Application Number 17717587
Status Pending
Filing Date 2022-04-11
First Publication Date 2022-07-28
Owner OneTrust, LLC (USA)
Inventor
  • Barday, Kabir A.
  • Brannon, Jonathan Blake
  • Beaumont, Richard A.
  • Mannix, John

Abstract

A consent receipt management system is configured to: (1) automatically cause a prior, validly received consent to expire (e.g., in response to a triggering event); and (2) in response to causing the previously received consent to expire, automatically trigger a recapture of consent. In particular embodiments, the system may, for example, be configured to cause a prior, validly received consent to expire in response to one or more triggering events.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06Q 10/10 - Office automation; Time management
  • H04L 9/40 - Network security protocols
  • G06F 21/60 - Protecting data
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 15/76 - Architectures of general purpose stored program computers
  1     2     3     ...     6        Next Page